SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Patch management
Applying the proper classification to the data
Gap analysis
Information contained on the equipment
2. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Data owners
Patch management
Continuous monitoring control initiatives
IP address packet filtering
3. A risk assessment should be conducted _________________.
Tie security risks to key business objectives
Equal error rate (EER)
Annually or whenever there is a significant change
Resource dependency assessment
4. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Key controls
The information security officer
People
Notifications and opt-out provisions
5. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Decentralization
Safeguards over keys
Cost of control
The balanced scorecard
6. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
The information security officer
Role-based policy
Properly aligned with business goals and objectives
BIA (Business Impact Assessment
7. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Role-based access control
The awareness and agreement of the data subjects
Cost of control
Well-defined roles and responsibilities
8. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Single sign-on (SSO) product
Baseline standard and then develop additional standards
Classification of assets needs
OBusiness case development
9. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Calculating the value of the information or asset
Tie security risks to key business objectives
Information contained on the equipment
Increase business value and confidence
10. A Successful risk management should lead to a ________________.
Comparison of cost of achievement
Risk management and the requirements of the organization
Breakeven point of risk reduction and cost
Annual loss expectancy (ALE)calculations
11. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Conduct a risk assessment
The board of directors and senior management
Compliance with the organization's information security requirements
The data custodian
12. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Single sign-on (SSO) product
Power surge/over voltage (spike)
Stress testing
Cyber terrorist
13. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
IP address packet filtering
Security code reviews for the entire software application
Methodology used in the assessment
Strategic alignment of security with business objectives
14. Applications cannot access data associated with other apps
Data isolation
Regular review of access control lists
Residual risk would be reduced by a greater amount
Logon banners
15. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
Information contained on the equipment
Nondisclosure agreement (NDA)
Equal error rate (EER)
16. Would protect against spoofing an internal address but would not provide strong authentication.
Service level agreements (SLAs)
IP address packet filtering
Negotiating a local version of the organization standards
Strategic alignment of security with business objectives
17. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Negotiating a local version of the organization standards
Prioritization
Compliance with the organization's information security requirements
Get senior management onboard
18. New security ulnerabilities should be managed through a ________________.
Risk assessment - evaluation and impact analysis
Proficiency testing
Patch management process
Power surge/over voltage (spike)
19. Has full responsibility over data.
Worm
Retention of business records
The data owner
Background check
20. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Logon banners
Classification of assets needs
Worm
Data classification
21. Occurs after the risk assessment process - it does not measure it.
Impractical and is often cost-prohibitive
Safeguards over keys
Use of security metrics
Gain unauthorized access to applications
22. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Process of introducing changes to systems
Its ability to reduce or eliminate business risks
Comparison of cost of achievement
Access control matrix
23. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Asset classification
Annually or whenever there is a significant change
Waterfall chart
Return on security investment (ROSI)
24. Provides process needs but not impact.
Security code reviews for the entire software application
Single sign-on (SSO) product
Lack of change management
Resource dependency assessment
25. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Defined objectives
Worm
Exceptions to policy
Calculating the value of the information or asset
26. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Cross-site scripting attacks
Attributes and characteristics of the 'desired state'
Power surge/over voltage (spike)
Transmit e-mail messages
27. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Access control matrix
Tie security risks to key business objectives
Increase business value and confidence
Cryptographic secure sockets layer (SSL) implementations and short key lengths
28. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Data owners
Cyber extortionist
Residual risk would be reduced by a greater amount
The authentication process is broken
29. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Data isolation
Risk assessment - evaluation and impact analysis
Applying the proper classification to the data
Worm
30. By definition are not previously known and therefore are undetectable.
Personal firewall
0-day vulnerabilities
Internal risk assessment
Data classification
31. Used to understand the flow of one process into another.
Waterfall chart
Vulnerability assessment
Owner of the information asset
Role-based policy
32. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Methodology used in the assessment
Skills inventory
Audit objectives
Notifications and opt-out provisions
33. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Deeper level of analysis
Script kiddie
Prioritization
Get senior management onboard
34. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Protective switch covers
Access control matrix
Calculating the value of the information or asset
Total cost of ownership (TCO)
35. Inject malformed input.
Cross-site scripting attacks
Data owners
Waterfall chart
Data mart
36. Should PRIMARILY be based on regulatory and legal requirements.
Process of introducing changes to systems
Data warehouse
Retention of business records
Do with the information it collects
37. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Biometric access control systems
Lack of change management
Phishing
Tailgating
38. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Fault-tolerant computer
Calculating the value of the information or asset
Conduct a risk assessment
Access control matrix
39. Company or person you believe will not send a virus-infect file knowingly
Trusted source
Asset classification
Control risk
Personal firewall
40. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
IP address packet filtering
OBusiness case development
Transferred risk
Key risk indicator (KRI) setup
41. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
Biometric access control systems
Regulatory compliance
Prioritization
42. Primarily reduce risk and are most effective for the protection of information assets.
Audit objectives
Key controls
Logon banners
Annual loss expectancy (ALE)calculations
43. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
Service level agreements (SLAs)
Impractical and is often cost-prohibitive
Cryptographic secure sockets layer (SSL) implementations and short key lengths
44. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Key risk indicator (KRI) setup
OBusiness case development
Centralization of information security management
include security responsibilities in a job description
45. Useful but only with regard to specific technical skills.
Compliance with the organization's information security requirements
Detection defenses
Nondisclosure agreement (NDA)
Proficiency testing
46. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Confidentiality
Certificate authority (CA)
Resource dependency assessment
47. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Cross-site scripting attacks
Annual loss expectancy (ALE)calculations
Rule-based access control
Do with the information it collects
48. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Control effectiveness
Overall organizational structure
Owner of the information asset
Exceptions to policy
49. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Worm
Risk appetite
Total cost of ownership (TCO)
Stress testing
50. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Two-factor authentication
Countermeasure cost-benefit analysis
Encryption key management
Regular review of access control lists
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests