SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Owner of the information asset
Residual risk
Total cost of ownership (TCO)
Hacker
2. Provide metrics to which outsourcing firms can be held accountable.
Service level agreements (SLAs)
Properly aligned with business goals and objectives
Fault-tolerant computer
Residual risk
3. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
Do with the information it collects
Control effectiveness
Continuous monitoring control initiatives
4. A key indicator of performance measurement.
Strategic alignment of security with business objectives
Patch management process
Fault-tolerant computer
Proficiency testing
5. A risk assessment should be conducted _________________.
Annually or whenever there is a significant change
Get senior management onboard
Data isolation
Risk appetite
6. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
What happened and how the breach was resolved
Single sign-on (SSO) product
Security baselines
Phishing
7. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Worm
include security responsibilities in a job description
Hacker
Cracker
8. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Centralized structure
Consensus on risks and controls
The data custodian
Requirements of the data owners
9. Should be performed to identify the risk and determine needed controls.
Aligned with organizational goals
A network vulnerability assessment
Retention of business records
Internal risk assessment
10. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Notifications and opt-out provisions
Monitoring processes
Information contained on the equipment
Cyber extortionist
11. Provides process needs but not impact.
The board of directors and senior management
Attributes and characteristics of the 'desired state'
People
Resource dependency assessment
12. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Personal firewall
Its ability to reduce or eliminate business risks
Certificate authority (CA)
Cost of control
13. The best measure for preventing the unauthorized disclosure of confidential information.
Proficiency testing
Normalization
Overall organizational structure
Acceptable use policies
14. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
The information security officer
Support the business objectives of the organization
Transmit e-mail messages
15. The most important characteristic of good security policies is that they be ____________________.
Audit objectives
Confidentiality
Deeper level of analysis
Aligned with organizational goals
16. Involves the correction of software weaknesses and would necessarily follow change management procedures.
The authentication process is broken
Negotiating a local version of the organization standards
Patch management
Do with the information it collects
17. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Phishing
Control effectiveness
Identify the vulnerable systems and apply compensating controls
Lack of change management
18. Identification and _______________ of business risk enables project managers to address areas with most significance.
Safeguards over keys
Information contained on the equipment
Prioritization
Centralization of information security management
19. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Undervoltage (brownout)
Identify the relevant systems and processes
Public key infrastructure (PKI)
Continuous analysis - monitoring and feedback
20. Should be a standard requirement for the service provider.
Security code reviews for the entire software application
Background check
Threat assessment
Comparison of cost of achievement
21. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
The awareness and agreement of the data subjects
Role-based policy
Role-based access control
Virus detection
22. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Consensus on risks and controls
Attributes and characteristics of the 'desired state'
Phishing
Comparison of cost of achievement
23. An information security manager has to impress upon the human resources department the need for _____________________.
Risk management and the requirements of the organization
Exceptions to policy
Continuous analysis - monitoring and feedback
Security awareness training for all employees
24. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Requirements of the data owners
Biometric access control systems
Return on security investment (ROSI)
Continuous analysis - monitoring and feedback
25. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Security baselines
Role-based policy
Owner of the information asset
Continuous analysis - monitoring and feedback
26. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Encryption
Attributes and characteristics of the 'desired state'
Two-factor authentication
Transmit e-mail messages
27. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Performing a risk assessment
Asset classification
Encryption key management
Properly aligned with business goals and objectives
28. It is easier to manage and control a _________________.
Cost of control
Centralized structure
The authentication process is broken
Creation of a business continuity plan
29. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Skills inventory
Data classification
Continuous monitoring control initiatives
Decentralization
30. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Platform security - intrusion detection and antivirus controls
All personnel
Trojan horse
Performing a risk assessment
31. Utility program that detects and protects a personal computer from unauthorized intrusions
Identify the vulnerable systems and apply compensating controls
include security responsibilities in a job description
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Personal firewall
32. All within the responsibility of the information security manager.
Platform security - intrusion detection and antivirus controls
Data owners
Normalization
The information security officer
33. The MOST important element of an information security strategy.
Defined objectives
The balanced scorecard
Hacker
Audit objectives
34. When defining the information classification policy - the ___________________ need to be identified.
Residual risk
Comparison of cost of achievement
Encryption key management
Requirements of the data owners
35. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Stress testing
Encryption of the hard disks
Baseline standard and then develop additional standards
Gain unauthorized access to applications
36. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
The board of directors and senior management
Public key infrastructure (PKI)
Virus
A network vulnerability assessment
37. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Encryption
Platform security - intrusion detection and antivirus controls
Risk management and the requirements of the organization
Role-based policy
38. Carries out the technical administration.
Annually or whenever there is a significant change
The database administrator
Deeper level of analysis
Risk assessment - evaluation and impact analysis
39. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Lack of change management
Patch management process
Encryption key management
40. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Centralization of information security management
BIA (Business Impact Assessment
The information security officer
Security code reviews for the entire software application
41. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Power surge/over voltage (spike)
Countermeasure cost-benefit analysis
Properly aligned with business goals and objectives
Stress testing
42. Primarily reduce risk and are most effective for the protection of information assets.
Get senior management onboard
People
Aligned with organizational goals
Key controls
43. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Attributes and characteristics of the 'desired state'
Annually or whenever there is a significant change
Notifications and opt-out provisions
Intrusion detection system (IDS)
44. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Annually or whenever there is a significant change
Increase business value and confidence
A network vulnerability assessment
Developing an information security baseline
45. Computer that has duplicate components so it can continue to operate when one of its main components fail
Fault-tolerant computer
Data classification
Is willing to accept
Malicious software and spyware
46. Only valid if assets have first been identified and appropriately valued.
Risk management and the requirements of the organization
Applying the proper classification to the data
Annual loss expectancy (ALE)calculations
Access control matrix
47. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Virus
Reduce risk to an acceptable level
Role-based policy
Inherent risk
48. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Well-defined roles and responsibilities
Proficiency testing
Total cost of ownership (TCO)
Reduce risk to an acceptable level
49. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Gap analysis
Transferred risk
Owner of the information asset
Negotiating a local version of the organization standards
50. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Role-based policy
Knowledge management
Conduct a risk assessment
Methodology used in the assessment