SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The information security manager needs to prioritize the controls based on ________________________.
Equal error rate (EER)
Background check
Risk management and the requirements of the organization
IP address packet filtering
2. Has full responsibility over data.
Confidentiality
The data owner
IP address packet filtering
Is willing to accept
3. To identify known vulnerabilities based on common misconfigurations and missing updates.
Get senior management onboard
A network vulnerability assessment
Trojan horse
Residual risk would be reduced by a greater amount
4. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Role-based policy
Owner of the information asset
Negotiating a local version of the organization standards
Background check
5. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Baseline standard and then develop additional standards
Deeper level of analysis
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Do with the information it collects
6. Should be performed to identify the risk and determine needed controls.
Breakeven point of risk reduction and cost
Consensus on risks and controls
Comparison of cost of achievement
Internal risk assessment
7. BEST option to improve accountability for a system administrator is to _____________________.
Impractical and is often cost-prohibitive
The authentication process is broken
Performing a risk assessment
include security responsibilities in a job description
8. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Patch management
Tie security risks to key business objectives
Data owners
Security baselines
9. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Assess the risks to the business operation
Exceptions to policy
Script kiddie
Cryptographic secure sockets layer (SSL) implementations and short key lengths
10. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Centralized structure
Comparison of cost of achievement
Increase business value and confidence
The board of directors and senior management
12. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Logon banners
Role-based access control
Identify the relevant systems and processes
Normalization
13. Primarily reduce risk and are most effective for the protection of information assets.
Internal risk assessment
Notifications and opt-out provisions
Key controls
MAL wear
14. Company or person you believe will not send a virus-infect file knowingly
Rule-based access control
The board of directors and senior management
Trusted source
Phishing
15. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Its ability to reduce or eliminate business risks
Patch management process
Intrusion detection system (IDS)
Regular review of access control lists
16. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Decentralization
Strategic alignment of security with business objectives
The awareness and agreement of the data subjects
Assess the risks to the business operation
17. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Audit objectives
Baseline standard and then develop additional standards
Phishing
Security awareness training for all employees
18. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
Process of introducing changes to systems
Defining high-level business security requirements
Residual risk
19. Should PRIMARILY be based on regulatory and legal requirements.
Is willing to accept
Penetration testing
Retention of business records
Overall organizational structure
20. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Platform security - intrusion detection and antivirus controls
Certificate authority (CA)
The data owner
Tie security risks to key business objectives
21. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
The board of directors and senior management
Creation of a business continuity plan
Support the business objectives of the organization
SWOT analysis
22. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Well-defined roles and responsibilities
0-day vulnerabilities
Trusted source
Transferred risk
23. It is easier to manage and control a _________________.
Centralized structure
Requirements of the data owners
Deeper level of analysis
Identify the relevant systems and processes
24. When the ________________ is more than the cost of the risk - the risk should be accepted.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Cost of control
Worm
Centralized structure
25. Oversees the overall classification management of the information.
Malicious software and spyware
Trusted source
The information security officer
Information contained on the equipment
26. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Defining high-level business security requirements
BIA (Business Impact Assessment
Gap analysis
Baseline standard and then develop additional standards
27. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Reduce risk to an acceptable level
The board of directors and senior management
OBusiness case development
Transferred risk
28. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Do with the information it collects
Encryption of the hard disks
Identify the vulnerable systems and apply compensating controls
People
29. Should be determined from the risk assessment results.
Developing an information security baseline
Certificate authority (CA)
Audit objectives
SWOT analysis
30. Someone who uses the internet or network to destroy or damage computers for political reasons
Service level agreements (SLAs)
Regulatory compliance
Methodology used in the assessment
Cyber terrorist
31. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Cost of control
Script kiddie
People
Safeguards over keys
32. Occurs when the electrical supply drops
Undervoltage (brownout)
Process of introducing changes to systems
Key risk indicator (KRI) setup
Continuous monitoring control initiatives
33. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Virus detection
Data mart
Multinational organization
Control effectiveness
34. Provides process needs but not impact.
The information security officer
Security baselines
Background check
Resource dependency assessment
35. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
OBusiness case development
Encryption
All personnel
Two-factor authentication
36. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Well-defined roles and responsibilities
Control risk
What happened and how the breach was resolved
Role-based policy
37. Program that hides within or looks like a legit program
Spoofing attacks
Trojan horse
The balanced scorecard
Cryptographic secure sockets layer (SSL) implementations and short key lengths
38. Ensure that transmitted information can be attributed to the named sender.
Digital signatures
Performing a risk assessment
Role-based policy
Alignment with business strategy
39. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Defining and ratifying the classification structure of information assets
Increase business value and confidence
Return on security investment (ROSI)
Data owners
40. Provide metrics to which outsourcing firms can be held accountable.
Security awareness training for all employees
Continuous monitoring control initiatives
Service level agreements (SLAs)
Information contained on the equipment
41. Should be a standard requirement for the service provider.
Background check
Logon banners
Protective switch covers
Control risk
42. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Data owners
Classification of assets needs
Security baselines
Worm
43. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Methodology used in the assessment
Classification of assets needs
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Transmit e-mail messages
44. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Overall organizational structure
Regulatory compliance
BIA (Business Impact Assessment
Safeguards over keys
45. provides the most effective protection of data on mobile devices.
Encryption
Use of security metrics
Safeguards over keys
Encryption key management
46. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Process of introducing changes to systems
Power surge/over voltage (spike)
Vulnerability assessment
Regular review of access control lists
47. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Conduct a risk assessment
SWOT analysis
Detection defenses
Logon banners
48. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Annual loss expectancy (ALE)calculations
Encryption of the hard disks
Decentralization
Residual risk
49. Utility program that detects and protects a personal computer from unauthorized intrusions
Baseline standard and then develop additional standards
Access control matrix
Key controls
Personal firewall
50. All within the responsibility of the information security manager.
Access control matrix
Strategic alignment of security with business objectives
Calculating the value of the information or asset
Platform security - intrusion detection and antivirus controls