SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Alignment with business strategy
Continuous analysis - monitoring and feedback
Notifications and opt-out provisions
IP address packet filtering
2. ecurity design flaws require a ____________________.
Penetration testing
Security risk
Deeper level of analysis
Background checks of prospective employees
3. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Decentralization
Get senior management onboard
Use of security metrics
Role-based access control
4. All within the responsibility of the information security manager.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
The data custodian
Platform security - intrusion detection and antivirus controls
Alignment with business strategy
5. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Platform security - intrusion detection and antivirus controls
Reduce risk to an acceptable level
Data isolation
Hacker
6. The primary role of the information security manager in the process of information classification within the organization.
Two-factor authentication
Defining and ratifying the classification structure of information assets
Resource dependency assessment
Continuous monitoring control initiatives
7. Provides process needs but not impact.
Increase business value and confidence
Security baselines
Resource dependency assessment
Internal risk assessment
8. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
BIA (Business Impact Assessment
Transferred risk
Exceptions to policy
Continuous monitoring control initiatives
9. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Transferred risk
Waterfall chart
Role-based access control
Identify the vulnerable systems and apply compensating controls
10. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Reduce risk to an acceptable level
Defining high-level business security requirements
Negotiating a local version of the organization standards
Worm
11. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Conduct a risk assessment
The data custodian
Comparison of cost of achievement
Internal risk assessment
12. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
All personnel
Single sign-on (SSO) product
Trusted source
Key risk indicator (KRI) setup
13. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Protective switch covers
Get senior management onboard
A network vulnerability assessment
Trojan horse
14. Ensure that transmitted information can be attributed to the named sender.
Resource dependency assessment
Undervoltage (brownout)
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Digital signatures
15. Uses security metrics to measure the performance of the information security program.
Information security manager
Deeper level of analysis
Breakeven point of risk reduction and cost
Key risk indicator (KRI) setup
16. Same intent as a cracker but does not have the technical skills and knowledge
Safeguards over keys
Script kiddie
Acceptable use policies
Multinational organization
17. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Retention of business records
Defined objectives
Asset classification
BIA (Business Impact Assessment
18. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Trojan horse
People
Worm
Lack of change management
19. The most important characteristic of good security policies is that they be ____________________.
Aligned with organizational goals
Patch management process
Residual risk would be reduced by a greater amount
Cyber terrorist
20. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Calculating the value of the information or asset
Penetration testing
Identify the vulnerable systems and apply compensating controls
Properly aligned with business goals and objectives
21. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Process of introducing changes to systems
Data warehouse
Identify the relevant systems and processes
Key controls
22. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Owner of the information asset
Classification of assets needs
Prioritization
IP address packet filtering
23. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Data owners
Spoofing attacks
Use of security metrics
Detection defenses
24. S small warehouse - designed for the end-user needs in a strategic business unit
Transferred risk
Data mart
Increase business value and confidence
Regular review of access control lists
25. When defining the information classification policy - the ___________________ need to be identified.
Tie security risks to key business objectives
Requirements of the data owners
Cyber extortionist
Alignment with business strategy
26. A method for analyzing and reducing a relational database to its most streamlined form
Intrusion detection system (IDS)
Normalization
Data mart
Defined objectives
27. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Digital signatures
Key risk indicator (KRI) setup
Worm
Security code reviews for the entire software application
28. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Digital certificate
Threat assessment
All personnel
Attributes and characteristics of the 'desired state'
29. An information security manager has to impress upon the human resources department the need for _____________________.
Service level agreements (SLAs)
Security awareness training for all employees
Risk appetite
Exceptions to policy
30. Reducing risk to a level too small to measure is _______________.
Support the business objectives of the organization
Classification of assets needs
Data warehouse
Impractical and is often cost-prohibitive
31. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Access control matrix
Is willing to accept
Security risk
Penetration testing
32. Information security governance models are highly dependent on the _____________________.
What happened and how the breach was resolved
Return on security investment (ROSI)
Overall organizational structure
Virus detection
33. Should be determined from the risk assessment results.
Audit objectives
What happened and how the breach was resolved
Penetration testing
Classification of assets needs
34. It is more efficient to establish a ___________________for locations that must meet specific requirements.
MAL wear
Baseline standard and then develop additional standards
The information security officer
Fault-tolerant computer
35. Should PRIMARILY be based on regulatory and legal requirements.
Transmit e-mail messages
Background checks of prospective employees
Retention of business records
Biometric access control systems
36. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Virus detection
Worm
The information security officer
Cyber extortionist
37. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Creation of a business continuity plan
Assess the risks to the business operation
Monitoring processes
Hacker
38. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
The authentication process is broken
Certificate authority (CA)
Inherent risk
Background check
39. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Monitoring processes
Logon banners
Notifications and opt-out provisions
Public key infrastructure (PKI)
40. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Resource dependency assessment
Well-defined roles and responsibilities
Logon banners
Regulatory compliance
41. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
Centralized structure
Countermeasure cost-benefit analysis
Assess the risks to the business operation
42. Should be performed to identify the risk and determine needed controls.
Internal risk assessment
Data owners
Cost of control
Owner of the information asset
43. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Cyber extortionist
Comparison of cost of achievement
Consensus on risks and controls
Proficiency testing
44. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Regular review of access control lists
Identify the vulnerable systems and apply compensating controls
Performing a risk assessment
Exceptions to policy
45. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Regulatory compliance
Encryption of the hard disks
Hacker
Security awareness training for all employees
46. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
All personnel
Increase business value and confidence
A network vulnerability assessment
Intrusion detection system (IDS)
47. Provide metrics to which outsourcing firms can be held accountable.
Service level agreements (SLAs)
Security baselines
Continuous monitoring control initiatives
Transferred risk
48. By definition are not previously known and therefore are undetectable.
Notifications and opt-out provisions
Cyber terrorist
Gain unauthorized access to applications
0-day vulnerabilities
49. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Lack of change management
Vulnerability assessment
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Well-defined roles and responsibilities
50. A repository of historical data organized by subject to support decision makers in the org
Is willing to accept
Data warehouse
Identify the relevant systems and processes
Internal risk assessment
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests