Test your basic knowledge |

CISM: Certified Information Security Manager

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides process needs but not impact.






2. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.






3. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works






4. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.






5. provides the most effective protection of data on mobile devices.






6. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.






7. It is easier to manage and control a _________________.






8. A key indicator of performance measurement.






9. Reducing risk to a level too small to measure is _______________.






10. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.






11. A notice that guarantees a user or a web site is legitimate






12. Applications cannot access data associated with other apps






13. ecurity design flaws require a ____________________.






14. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.






15. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.






16. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.






17. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.






18. Inject malformed input.






19. Same intent as a cracker but does not have the technical skills and knowledge






20. The most important characteristic of good security policies is that they be ____________________.






21. In order to highlight to management the importance of network security - the security manager should FIRST _______________.






22. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.






23. Primarily reduce risk and are most effective for the protection of information assets.






24. Carries out the technical administration.






25. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing






26. A repository of historical data organized by subject to support decision makers in the org






27. Risk should be reduced to a level that an organization _____________.






28. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.






29. Useful but only with regard to specific technical skills.






30. Occurs after the risk assessment process - it does not measure it.






31. The data owner is responsible for _______________________.






32. Company or person you believe will not send a virus-infect file knowingly






33. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.






34. Used to understand the flow of one process into another.






35. Information security governance models are highly dependent on the _____________________.






36. The MOST useful way to describe the objectives in the information security strategy is through ______________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. Computer that has duplicate components so it can continue to operate when one of its main components fail






38. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.






39. The best measure and will involve reviewing the entire source code to detect all instances of back doors.






40. S small warehouse - designed for the end-user needs in a strategic business unit






41. Involves the correction of software weaknesses and would necessarily follow change management procedures.






42. Change management controls the _____________________. This is often the point at which a weakness will be introduced.






43. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.






44. The best measure for preventing the unauthorized disclosure of confidential information.






45. Provides strong online authentication.






46. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.






47. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but






48. Should be determined from the risk assessment results.






49. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.






50. Awareness - training and physical security defenses.