SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
Attributes and characteristics of the 'desired state'
Reduce risk to an acceptable level
Baseline standard and then develop additional standards
2. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Developing an information security baseline
Continuous monitoring control initiatives
Personal firewall
Baseline standard and then develop additional standards
3. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
IP address packet filtering
Multinational organization
Skills inventory
Security baselines
4. Information security governance models are highly dependent on the _____________________.
Overall organizational structure
Breakeven point of risk reduction and cost
Risk assessment - evaluation and impact analysis
Tie security risks to key business objectives
5. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Patch management
Risk appetite
Annually or whenever there is a significant change
Cyber extortionist
6. Provide metrics to which outsourcing firms can be held accountable.
Information contained on the equipment
Requirements of the data owners
Service level agreements (SLAs)
Inherent risk
7. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Service level agreements (SLAs)
Control effectiveness
Performing a risk assessment
Two-factor authentication
8. By definition are not previously known and therefore are undetectable.
Power surge/over voltage (spike)
Impractical and is often cost-prohibitive
Cost of control
0-day vulnerabilities
9. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Inherent risk
Prioritization
Security code reviews for the entire software application
Residual risk would be reduced by a greater amount
10. Provides process needs but not impact.
Threat assessment
Resource dependency assessment
Protective switch covers
Data owners
11. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Gap analysis
Defining high-level business security requirements
Security risk
12. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Compliance with the organization's information security requirements
Logon banners
Power surge/over voltage (spike)
Impractical and is often cost-prohibitive
13. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Transferred risk
Key controls
Classification of assets needs
The authentication process is broken
14. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Fault-tolerant computer
Key risk indicator (KRI) setup
BIA (Business Impact Assessment
The balanced scorecard
15. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Key risk indicator (KRI) setup
Risk assessment - evaluation and impact analysis
Virus detection
Creation of a business continuity plan
16. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Penetration testing
Patch management process
Properly aligned with business goals and objectives
Role-based access control
17. Provides strong online authentication.
Public key infrastructure (PKI)
Do with the information it collects
Negotiating a local version of the organization standards
Encryption
18. Most effective for evaluating the degree to which information security objectives are being met.
Information contained on the equipment
The balanced scorecard
Detection defenses
SWOT analysis
19. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Countermeasure cost-benefit analysis
Regular review of access control lists
Data classification
Security code reviews for the entire software application
20. It is easier to manage and control a _________________.
IP address packet filtering
Retention of business records
Centralized structure
Methodology used in the assessment
21. Program that hides within or looks like a legit program
BIA (Business Impact Assessment
Transmit e-mail messages
Trojan horse
Access control matrix
22. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Methodology used in the assessment
Countermeasure cost-benefit analysis
People
Decentralization
23. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Control risk
Biometric access control systems
Baseline standard and then develop additional standards
Centralized structure
24. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Decentralization
The balanced scorecard
Patch management
Tie security risks to key business objectives
25. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Encryption key management
Gap analysis
Data isolation
SWOT analysis
26. Needs to define the access rules - which is troublesome and error prone in large organizations.
Patch management process
Applying the proper classification to the data
Centralization of information security management
Rule-based access control
27. Ensures that there are no scalability problems.
Information contained on the equipment
Risk assessment - evaluation and impact analysis
The information security officer
Stress testing
28. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Examples of containment defenses
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Gain unauthorized access to applications
Intrusion detection system (IDS)
29. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Applying the proper classification to the data
Negotiating a local version of the organization standards
Security risk
Assess the risks to the business operation
30. A key indicator of performance measurement.
Lack of change management
Stress testing
The authentication process is broken
Strategic alignment of security with business objectives
31. Whenever personal data are transferred across national boundaries; ________________________ are required.
Requirements of the data owners
The awareness and agreement of the data subjects
Certificate authority (CA)
The data custodian
32. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Consensus on risks and controls
Defining high-level business security requirements
Two-factor authentication
Do with the information it collects
33. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Digital signatures
Inherent risk
Information security manager
34. A method for analyzing and reducing a relational database to its most streamlined form
Worm
Normalization
Examples of containment defenses
Trojan horse
35. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Properly aligned with business goals and objectives
Residual risk would be reduced by a greater amount
Spoofing attacks
Identify the relevant systems and processes
36. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Developing an information security baseline
Cost of control
Requirements of the data owners
Protective switch covers
37. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Risk assessment - evaluation and impact analysis
Cross-site scripting attacks
Knowledge management
Security baselines
38. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Transferred risk
Phishing
Knowledge management
Control risk
39. Carries out the technical administration.
The database administrator
Classification of assets needs
Control risk
Resource dependency assessment
40. Ensure that transmitted information can be attributed to the named sender.
Creation of a business continuity plan
Platform security - intrusion detection and antivirus controls
Digital signatures
Role-based policy
41. Responsible for securing the information.
The information security officer
Negotiating a local version of the organization standards
The data custodian
The balanced scorecard
42. Identification and _______________ of business risk enables project managers to address areas with most significance.
Prioritization
Assess the risks to the business operation
Safeguards over keys
Background checks of prospective employees
43. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Key controls
Alignment with business strategy
Nondisclosure agreement (NDA)
Normalization
44. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
Cracker
Conduct a risk assessment
Encryption
45. Has to be integrated into the requirements of every software application's design.
Multinational organization
Prioritization
Rule-based access control
Encryption key management
46. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Data mart
Control effectiveness
Equal error rate (EER)
Key controls
47. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Baseline standard and then develop additional standards
Risk assessment - evaluation and impact analysis
Increase business value and confidence
Centralized structure
48. All within the responsibility of the information security manager.
Cost of control
Platform security - intrusion detection and antivirus controls
The data custodian
Continuous monitoring control initiatives
49. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
All personnel
Tie security risks to key business objectives
Impractical and is often cost-prohibitive
50. The most important characteristic of good security policies is that they be ____________________.
Regular review of access control lists
Aligned with organizational goals
Role-based policy
Detection defenses