SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Needs to define the access rules - which is troublesome and error prone in large organizations.
Rule-based access control
Creation of a business continuity plan
Assess the risks to the business operation
Digital signatures
2. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Transferred risk
Performing a risk assessment
Nondisclosure agreement (NDA)
The database administrator
3. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Power surge/over voltage (spike)
Skills inventory
Tailgating
Data isolation
4. Programs that act without a user's knowledge and deliberately alter a computer's operations
Cracker
MAL wear
Normalization
Aligned with organizational goals
5. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Applying the proper classification to the data
Rule-based access control
Acceptable use policies
Risk assessment - evaluation and impact analysis
6. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
Audit objectives
Patch management process
Do with the information it collects
7. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Asset classification
Vulnerability assessment
Conduct a risk assessment
The authentication process is broken
8. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Security risk
Encryption of the hard disks
Risk appetite
Assess the risks to the business operation
9. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Safeguards over keys
Control effectiveness
People
Control risk
10. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
OBusiness case development
Waterfall chart
Transferred risk
Data classification
11. By definition are not previously known and therefore are undetectable.
Exceptions to policy
Transferred risk
Spoofing attacks
0-day vulnerabilities
12. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Continuous analysis - monitoring and feedback
Digital signatures
Spoofing attacks
Lack of change management
13. Used to understand the flow of one process into another.
Waterfall chart
OBusiness case development
Is willing to accept
Knowledge management
14. The information security manager needs to prioritize the controls based on ________________________.
What happened and how the breach was resolved
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Risk management and the requirements of the organization
Cyber terrorist
15. Company or person you believe will not send a virus-infect file knowingly
Trusted source
Fault-tolerant computer
Well-defined roles and responsibilities
Equal error rate (EER)
16. Accesses a computer or network illegally
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Cracker
Tie security risks to key business objectives
Support the business objectives of the organization
17. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Key risk indicator (KRI) setup
Continuous monitoring control initiatives
Two-factor authentication
Prioritization
18. BEST option to improve accountability for a system administrator is to _____________________.
include security responsibilities in a job description
Retention of business records
Equal error rate (EER)
The authentication process is broken
19. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
0-day vulnerabilities
Malicious software and spyware
Alignment with business strategy
The board of directors and senior management
20. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Increase business value and confidence
Support the business objectives of the organization
Risk assessment - evaluation and impact analysis
Public key infrastructure (PKI)
21. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Total cost of ownership (TCO)
Properly aligned with business goals and objectives
All personnel
Audit objectives
22. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Risk management and the requirements of the organization
Countermeasure cost-benefit analysis
Annual loss expectancy (ALE)calculations
Patch management
23. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Centralized structure
Defined objectives
Return on security investment (ROSI)
Consensus on risks and controls
24. When the ________________ is more than the cost of the risk - the risk should be accepted.
The authentication process is broken
What happened and how the breach was resolved
The data owner
Cost of control
25. Has full responsibility over data.
Classification of assets needs
The data owner
Background checks of prospective employees
Security awareness training for all employees
26. Should be a standard requirement for the service provider.
Comparison of cost of achievement
Security code reviews for the entire software application
Background check
Centralized structure
27. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Methodology used in the assessment
Transmit e-mail messages
Developing an information security baseline
Nondisclosure agreement (NDA)
28. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Risk management and the requirements of the organization
Get senior management onboard
Examples of containment defenses
Transferred risk
29. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Decentralization
Assess the risks to the business operation
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Prioritization
30. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Penetration testing
Service level agreements (SLAs)
The awareness and agreement of the data subjects
Residual risk would be reduced by a greater amount
31. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Centralized structure
Inherent risk
Role-based policy
The data owner
32. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
The awareness and agreement of the data subjects
Aligned with organizational goals
Examples of containment defenses
Data owners
33. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Data isolation
Virus detection
Exceptions to policy
Vulnerability assessment
34. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Biometric access control systems
Assess the risks to the business operation
Lack of change management
Cyber extortionist
35. Should PRIMARILY be based on regulatory and legal requirements.
Security risk
Gain unauthorized access to applications
Control risk
Retention of business records
36. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Logon banners
Security risk
Patch management
Public key infrastructure (PKI)
37. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Intrusion detection system (IDS)
Information contained on the equipment
Encryption
Properly aligned with business goals and objectives
38. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Attributes and characteristics of the 'desired state'
Risk management and the requirements of the organization
Single sign-on (SSO) product
Centralization of information security management
39. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Gain unauthorized access to applications
Access control matrix
Confidentiality
Decentralization
40. Has to be integrated into the requirements of every software application's design.
The data owner
Rule-based access control
Encryption key management
All personnel
41. Occurs after the risk assessment process - it does not measure it.
Retention of business records
Use of security metrics
Resource dependency assessment
Nondisclosure agreement (NDA)
42. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Information security manager
Continuous monitoring control initiatives
Prioritization
Continuous analysis - monitoring and feedback
43. A risk assessment should be conducted _________________.
Annually or whenever there is a significant change
Equal error rate (EER)
include security responsibilities in a job description
Service level agreements (SLAs)
44. Inject malformed input.
Data warehouse
Cross-site scripting attacks
Patch management
Breakeven point of risk reduction and cost
45. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Safeguards over keys
Detection defenses
MAL wear
Audit objectives
46. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
SWOT analysis
The database administrator
The board of directors and senior management
What happened and how the breach was resolved
47. provides the most effective protection of data on mobile devices.
Assess the risks to the business operation
Encryption
Countermeasure cost-benefit analysis
Identify the relevant systems and processes
48. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Cyber extortionist
Phishing
Knowledge management
Identify the vulnerable systems and apply compensating controls
49. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Support the business objectives of the organization
Risk appetite
Gain unauthorized access to applications
Identify the vulnerable systems and apply compensating controls
50. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Applying the proper classification to the data
Creation of a business continuity plan
Nondisclosure agreement (NDA)
Key risk indicator (KRI) setup