SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Prioritization
Owner of the information asset
Identify the relevant systems and processes
Risk assessment - evaluation and impact analysis
2. Would protect against spoofing an internal address but would not provide strong authentication.
Data isolation
SWOT analysis
Cracker
IP address packet filtering
3. Only valid if assets have first been identified and appropriately valued.
Knowledge management
Annual loss expectancy (ALE)calculations
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Assess the risks to the business operation
4. Normally addressed through antivirus and antispyware policies.
Detection defenses
Monitoring processes
Malicious software and spyware
Data owners
5. Risk should be reduced to a level that an organization _____________.
Decentralization
Is willing to accept
Deeper level of analysis
Information security manager
6. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Gap analysis
Hacker
Negotiating a local version of the organization standards
7. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Nondisclosure agreement (NDA)
Information security manager
Personal firewall
Notifications and opt-out provisions
8. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Script kiddie
Patch management
Baseline standard and then develop additional standards
Cyber extortionist
9. Applications cannot access data associated with other apps
Data isolation
Equal error rate (EER)
Security baselines
Examples of containment defenses
10. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Personal firewall
Equal error rate (EER)
Its ability to reduce or eliminate business risks
The information security officer
11. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Owner of the information asset
Cross-site scripting attacks
Compliance with the organization's information security requirements
Defining high-level business security requirements
12. Has full responsibility over data.
The data owner
Baseline standard and then develop additional standards
Requirements of the data owners
Power surge/over voltage (spike)
13. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Annually or whenever there is a significant change
Methodology used in the assessment
Cost of control
Performing a risk assessment
14. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Control risk
Digital certificate
Internal risk assessment
Intrusion detection system (IDS)
15. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
What happened and how the breach was resolved
Encryption key management
Continuous monitoring control initiatives
Tie security risks to key business objectives
16. Awareness - training and physical security defenses.
The data custodian
Tie security risks to key business objectives
Examples of containment defenses
Trusted source
17. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Information security manager
Nondisclosure agreement (NDA)
Inherent risk
Waterfall chart
18. BEST option to improve accountability for a system administrator is to _____________________.
include security responsibilities in a job description
Single sign-on (SSO) product
Regulatory compliance
The balanced scorecard
19. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
Spoofing attacks
Data mart
Data owners
20. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Platform security - intrusion detection and antivirus controls
Countermeasure cost-benefit analysis
OBusiness case development
Waterfall chart
21. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Prioritization
Encryption
Information contained on the equipment
Virus detection
22. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Vulnerability assessment
Decentralization
Conduct a risk assessment
Logon banners
23. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Knowledge management
Developing an information security baseline
Identify the vulnerable systems and apply compensating controls
Personal firewall
24. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Stress testing
The data custodian
Risk management and the requirements of the organization
Virus
25. Occurs after the risk assessment process - it does not measure it.
Internal risk assessment
Conduct a risk assessment
Undervoltage (brownout)
Use of security metrics
26. A repository of historical data organized by subject to support decision makers in the org
Control risk
Data warehouse
Centralized structure
Inherent risk
27. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Spoofing attacks
Detection defenses
People
Security risk
28. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Methodology used in the assessment
Phishing
Data warehouse
Worm
29. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Identify the vulnerable systems and apply compensating controls
Public key infrastructure (PKI)
Residual risk would be reduced by a greater amount
Role-based policy
30. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
SWOT analysis
Strategic alignment of security with business objectives
Get senior management onboard
Identify the relevant systems and processes
31. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Centralization of information security management
BIA (Business Impact Assessment
Security awareness training for all employees
32. Provides process needs but not impact.
IP address packet filtering
Information security manager
Tie security risks to key business objectives
Resource dependency assessment
33. To identify known vulnerabilities based on common misconfigurations and missing updates.
A network vulnerability assessment
Deeper level of analysis
All personnel
Data warehouse
34. Should PRIMARILY be based on regulatory and legal requirements.
Intrusion detection system (IDS)
Retention of business records
Security code reviews for the entire software application
Total cost of ownership (TCO)
35. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Regulatory compliance
Overall organizational structure
Defining and ratifying the classification structure of information assets
Worm
36. Provides strong online authentication.
Data owners
Public key infrastructure (PKI)
Prioritization
Encryption of the hard disks
37. ecurity design flaws require a ____________________.
Deeper level of analysis
Retention of business records
Baseline standard and then develop additional standards
Defined objectives
38. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Confidentiality
The information security officer
Transferred risk
Security risk
39. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Protective switch covers
Penetration testing
Normalization
Examples of containment defenses
40. The MOST important element of an information security strategy.
Waterfall chart
Defined objectives
Information security manager
Impractical and is often cost-prohibitive
41. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Single sign-on (SSO) product
Return on security investment (ROSI)
Public key infrastructure (PKI)
Cross-site scripting attacks
42. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Data mart
Gain unauthorized access to applications
The database administrator
Impractical and is often cost-prohibitive
43. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Personal firewall
Security code reviews for the entire software application
Performing a risk assessment
Skills inventory
44. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Malicious software and spyware
Nondisclosure agreement (NDA)
Lack of change management
Do with the information it collects
45. The information security manager needs to prioritize the controls based on ________________________.
Data classification
Risk management and the requirements of the organization
Worm
Gain unauthorized access to applications
46. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Data classification
The information security officer
Defining and ratifying the classification structure of information assets
Cyber extortionist
47. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Developing an information security baseline
Information security manager
Biometric access control systems
Two-factor authentication
48. Primarily reduce risk and are most effective for the protection of information assets.
Key controls
Exceptions to policy
Data isolation
Creation of a business continuity plan
49. Computer that has duplicate components so it can continue to operate when one of its main components fail
Gain unauthorized access to applications
Acceptable use policies
Information security manager
Fault-tolerant computer
50. The most important characteristic of good security policies is that they be ____________________.
Strategic alignment of security with business objectives
Asset classification
Aligned with organizational goals
The awareness and agreement of the data subjects
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests