SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
All personnel
Defining and ratifying the classification structure of information assets
The authentication process is broken
2. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
The information security officer
Security baselines
Impractical and is often cost-prohibitive
People
3. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Transferred risk
Deeper level of analysis
Decentralization
Control effectiveness
4. The most important characteristic of good security policies is that they be ____________________.
Aligned with organizational goals
Do with the information it collects
Single sign-on (SSO) product
Developing an information security baseline
5. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Encryption key management
Safeguards over keys
Internal risk assessment
Cost of control
6. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Intrusion detection system (IDS)
Nondisclosure agreement (NDA)
Normalization
Continuous monitoring control initiatives
7. Primarily reduce risk and are most effective for the protection of information assets.
Key controls
Public key infrastructure (PKI)
0-day vulnerabilities
Background check
8. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Normalization
Properly aligned with business goals and objectives
Security code reviews for the entire software application
Increase business value and confidence
9. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Decentralization
Assess the risks to the business operation
Comparison of cost of achievement
Rule-based access control
10. To identify known vulnerabilities based on common misconfigurations and missing updates.
Comparison of cost of achievement
A network vulnerability assessment
Residual risk
Regulatory compliance
11. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Worm
Internal risk assessment
Reduce risk to an acceptable level
Alignment with business strategy
12. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Biometric access control systems
Total cost of ownership (TCO)
Knowledge management
Asset classification
13. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
MAL wear
Inherent risk
Risk assessment - evaluation and impact analysis
Regulatory compliance
14. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Service level agreements (SLAs)
Encryption of the hard disks
Alignment with business strategy
Security code reviews for the entire software application
15. Reducing risk to a level too small to measure is _______________.
Logon banners
Personal firewall
Impractical and is often cost-prohibitive
Digital signatures
16. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Its ability to reduce or eliminate business risks
Exceptions to policy
Acceptable use policies
Asset classification
17. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Methodology used in the assessment
Encryption of the hard disks
Key risk indicator (KRI) setup
Decentralization
18. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Performing a risk assessment
Risk management and the requirements of the organization
Control risk
Key controls
19. Utility program that detects and protects a personal computer from unauthorized intrusions
Retention of business records
Personal firewall
Strategic alignment of security with business objectives
Control effectiveness
20. A repository of historical data organized by subject to support decision makers in the org
Identify the vulnerable systems and apply compensating controls
Data warehouse
Two-factor authentication
Asset classification
21. Culture has a significant impact on how information security will be implemented in a ______________________.
Worm
Multinational organization
Encryption of the hard disks
Logon banners
22. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Audit objectives
Threat assessment
Undervoltage (brownout)
MAL wear
23. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Encryption key management
Comparison of cost of achievement
Encryption of the hard disks
Tie security risks to key business objectives
25. Should be a standard requirement for the service provider.
Applying the proper classification to the data
The database administrator
The awareness and agreement of the data subjects
Background check
26. Responsible for securing the information.
Confidentiality
The data custodian
Trojan horse
The board of directors and senior management
27. Occurs when the incoming level
Power surge/over voltage (spike)
SWOT analysis
Overall organizational structure
Notifications and opt-out provisions
28. Most effective for evaluating the degree to which information security objectives are being met.
Access control matrix
The balanced scorecard
Information security manager
Exceptions to policy
29. When defining the information classification policy - the ___________________ need to be identified.
Creation of a business continuity plan
Requirements of the data owners
Control effectiveness
Data classification
30. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Single sign-on (SSO) product
OBusiness case development
Encryption of the hard disks
Detection defenses
31. Carries out the technical administration.
The database administrator
Performing a risk assessment
The board of directors and senior management
The data owner
32. provides the most effective protection of data on mobile devices.
Classification of assets needs
Encryption
Is willing to accept
Residual risk
33. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Vulnerability assessment
Classification of assets needs
Properly aligned with business goals and objectives
Patch management
34. Only valid if assets have first been identified and appropriately valued.
Personal firewall
Normalization
Intrusion detection system (IDS)
Annual loss expectancy (ALE)calculations
35. Has full responsibility over data.
Spoofing attacks
Reduce risk to an acceptable level
Risk assessment - evaluation and impact analysis
The data owner
36. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Security code reviews for the entire software application
Notifications and opt-out provisions
Gap analysis
People
37. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Increase business value and confidence
Acceptable use policies
Service level agreements (SLAs)
Lack of change management
38. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Reduce risk to an acceptable level
Security risk
Prioritization
Single sign-on (SSO) product
39. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Transmit e-mail messages
All personnel
A network vulnerability assessment
Identify the vulnerable systems and apply compensating controls
40. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Properly aligned with business goals and objectives
Malicious software and spyware
Worm
Role-based policy
41. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Biometric access control systems
BIA (Business Impact Assessment
Access control matrix
Security risk
42. Would protect against spoofing an internal address but would not provide strong authentication.
Is willing to accept
IP address packet filtering
The authentication process is broken
Virus detection
43. The data owner is responsible for _______________________.
Applying the proper classification to the data
Security risk
Return on security investment (ROSI)
People
44. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Background checks of prospective employees
Baseline standard and then develop additional standards
Residual risk
Properly aligned with business goals and objectives
45. BEST option to improve accountability for a system administrator is to _____________________.
Data isolation
include security responsibilities in a job description
Inherent risk
Methodology used in the assessment
46. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Security risk
Gain unauthorized access to applications
Public key infrastructure (PKI)
Applying the proper classification to the data
47. Needs to define the access rules - which is troublesome and error prone in large organizations.
Equal error rate (EER)
Multinational organization
Rule-based access control
Reduce risk to an acceptable level
48. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Overall organizational structure
Developing an information security baseline
Continuous analysis - monitoring and feedback
Two-factor authentication
49. A risk assessment should be conducted _________________.
Patch management
Digital signatures
Annually or whenever there is a significant change
Information contained on the equipment
50. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Exceptions to policy
Residual risk would be reduced by a greater amount
include security responsibilities in a job description
A network vulnerability assessment