SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Centralization of information security management
Key risk indicator (KRI) setup
The awareness and agreement of the data subjects
Overall organizational structure
2. Ensures that there are no scalability problems.
Access control matrix
Security risk
Stress testing
Cyber extortionist
3. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
OBusiness case development
The board of directors and senior management
Security code reviews for the entire software application
Encryption key management
4. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Security risk
Acceptable use policies
Stress testing
Encryption of the hard disks
6. Risk should be reduced to a level that an organization _____________.
Is willing to accept
Monitoring processes
Trojan horse
Vulnerability assessment
7. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Audit objectives
Cost of control
Control risk
Encryption key management
8. All within the responsibility of the information security manager.
Platform security - intrusion detection and antivirus controls
Prioritization
Knowledge management
Alignment with business strategy
9. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Internal risk assessment
Security code reviews for the entire software application
Two-factor authentication
Waterfall chart
10. Identification and _______________ of business risk enables project managers to address areas with most significance.
Prioritization
Use of security metrics
Equal error rate (EER)
Inherent risk
11. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
MAL wear
SWOT analysis
Security awareness training for all employees
12. Provide metrics to which outsourcing firms can be held accountable.
The balanced scorecard
Service level agreements (SLAs)
Equal error rate (EER)
Hacker
13. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Digital signatures
Annually or whenever there is a significant change
A network vulnerability assessment
Biometric access control systems
14. Provides process needs but not impact.
Resource dependency assessment
Cracker
SWOT analysis
Control effectiveness
15. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Stress testing
Malicious software and spyware
Get senior management onboard
Rule-based access control
16. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Defining and ratifying the classification structure of information assets
Encryption key management
The board of directors and senior management
Increase business value and confidence
17. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Script kiddie
Security code reviews for the entire software application
Decentralization
18. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Tie security risks to key business objectives
Attributes and characteristics of the 'desired state'
Process of introducing changes to systems
Role-based policy
19. Would protect against spoofing an internal address but would not provide strong authentication.
The data owner
IP address packet filtering
Risk management and the requirements of the organization
Lack of change management
20. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Use of security metrics
Script kiddie
Asset classification
Monitoring processes
21. Culture has a significant impact on how information security will be implemented in a ______________________.
Defining and ratifying the classification structure of information assets
Role-based policy
Multinational organization
Protective switch covers
22. Useful but only with regard to specific technical skills.
Data classification
Tie security risks to key business objectives
Proficiency testing
Cracker
23. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Data classification
Nondisclosure agreement (NDA)
Cyber extortionist
Cost of control
24. A key indicator of performance measurement.
Prioritization
Support the business objectives of the organization
Asset classification
Strategic alignment of security with business objectives
25. An information security manager has to impress upon the human resources department the need for _____________________.
Key risk indicator (KRI) setup
Monitoring processes
Use of security metrics
Security awareness training for all employees
26. A risk assessment should be conducted _________________.
Risk assessment - evaluation and impact analysis
Control effectiveness
Acceptable use policies
Annually or whenever there is a significant change
27. Uses security metrics to measure the performance of the information security program.
Information security manager
All personnel
Hacker
Role-based access control
28. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Is willing to accept
BIA (Business Impact Assessment
Rule-based access control
IP address packet filtering
29. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Worm
Transmit e-mail messages
Applying the proper classification to the data
Risk management and the requirements of the organization
30. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Continuous analysis - monitoring and feedback
Countermeasure cost-benefit analysis
Examples of containment defenses
Calculating the value of the information or asset
31. Inject malformed input.
A network vulnerability assessment
Lack of change management
Cross-site scripting attacks
Nondisclosure agreement (NDA)
32. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Knowledge management
Logon banners
Use of security metrics
Notifications and opt-out provisions
33. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Internal risk assessment
Regulatory compliance
Baseline standard and then develop additional standards
Virus
34. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Developing an information security baseline
Acceptable use policies
Encryption
Personal firewall
35. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Defining and ratifying the classification structure of information assets
Patch management
Hacker
Platform security - intrusion detection and antivirus controls
36. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Malicious software and spyware
Knowledge management
Security awareness training for all employees
Encryption of the hard disks
37. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Personal firewall
Get senior management onboard
Gain unauthorized access to applications
Safeguards over keys
38. Information security governance models are highly dependent on the _____________________.
Overall organizational structure
Examples of containment defenses
Security code reviews for the entire software application
Malicious software and spyware
39. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Conduct a risk assessment
Tie security risks to key business objectives
Knowledge management
Nondisclosure agreement (NDA)
40. Accesses a computer or network illegally
Owner of the information asset
Waterfall chart
Creation of a business continuity plan
Cracker
41. Reducing risk to a level too small to measure is _______________.
Risk management and the requirements of the organization
Worm
Internal risk assessment
Impractical and is often cost-prohibitive
42. When defining the information classification policy - the ___________________ need to be identified.
Inherent risk
Attributes and characteristics of the 'desired state'
Worm
Requirements of the data owners
43. Awareness - training and physical security defenses.
Examples of containment defenses
Patch management
Trojan horse
Process of introducing changes to systems
44. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Resource dependency assessment
Residual risk would be reduced by a greater amount
Defining and ratifying the classification structure of information assets
0-day vulnerabilities
45. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Continuous monitoring control initiatives
Gain unauthorized access to applications
Single sign-on (SSO) product
Centralization of information security management
46. Provides strong online authentication.
Penetration testing
Public key infrastructure (PKI)
Creation of a business continuity plan
Well-defined roles and responsibilities
47. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Equal error rate (EER)
Data classification
Detection defenses
The authentication process is broken
48. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Gap analysis
Defined objectives
Worm
Background check
49. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
Script kiddie
Regulatory compliance
Protective switch covers
50. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Equal error rate (EER)
Gain unauthorized access to applications
The database administrator
Developing an information security baseline