SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
BIA (Business Impact Assessment
Reduce risk to an acceptable level
Risk assessment - evaluation and impact analysis
Key risk indicator (KRI) setup
2. By definition are not previously known and therefore are undetectable.
Calculating the value of the information or asset
include security responsibilities in a job description
Cyber extortionist
0-day vulnerabilities
3. The job of the information security officer on a management team is to ___________________.
Prioritization
Assess the risks to the business operation
Security code reviews for the entire software application
Stress testing
4. Awareness - training and physical security defenses.
Examples of containment defenses
SWOT analysis
The database administrator
Support the business objectives of the organization
5. Should be performed to identify the risk and determine needed controls.
Impractical and is often cost-prohibitive
Internal risk assessment
Two-factor authentication
Information security manager
6. Computer that has duplicate components so it can continue to operate when one of its main components fail
IP address packet filtering
Retention of business records
Fault-tolerant computer
Public key infrastructure (PKI)
7. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Defining high-level business security requirements
Centralization of information security management
Defining and ratifying the classification structure of information assets
Encryption key management
8. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Requirements of the data owners
Applying the proper classification to the data
What happened and how the breach was resolved
Continuous monitoring control initiatives
9. Inject malformed input.
Cross-site scripting attacks
Safeguards over keys
Its ability to reduce or eliminate business risks
Spoofing attacks
10. Ensure that transmitted information can be attributed to the named sender.
Acceptable use policies
Digital signatures
Alignment with business strategy
Use of security metrics
11. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Cross-site scripting attacks
Alignment with business strategy
Data mart
Monitoring processes
12. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Audit objectives
Patch management
Get senior management onboard
Defining high-level business security requirements
13. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Service level agreements (SLAs)
Classification of assets needs
SWOT analysis
Lack of change management
14. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Consensus on risks and controls
Transmit e-mail messages
Data warehouse
Creation of a business continuity plan
15. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
Security risk
Cyber extortionist
Notifications and opt-out provisions
16. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
Consensus on risks and controls
Personal firewall
Proficiency testing
17. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Alignment with business strategy
Data mart
Encryption of the hard disks
A network vulnerability assessment
18. Occurs after the risk assessment process - it does not measure it.
Do with the information it collects
Residual risk would be reduced by a greater amount
Role-based policy
Use of security metrics
19. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Resource dependency assessment
Impractical and is often cost-prohibitive
Examples of containment defenses
20. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
0-day vulnerabilities
Spoofing attacks
Defined objectives
Residual risk would be reduced by a greater amount
21. Provides strong online authentication.
Security awareness training for all employees
Asset classification
Public key infrastructure (PKI)
Script kiddie
22. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Comparison of cost of achievement
Tie security risks to key business objectives
Methodology used in the assessment
Access control matrix
23. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Aligned with organizational goals
Cyber extortionist
Well-defined roles and responsibilities
Consensus on risks and controls
24. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Exceptions to policy
Protective switch covers
Decentralization
The database administrator
25. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Spoofing attacks
Its ability to reduce or eliminate business risks
Cyber terrorist
26. Information security governance models are highly dependent on the _____________________.
Risk assessment - evaluation and impact analysis
Certificate authority (CA)
Overall organizational structure
Proficiency testing
27. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Gain unauthorized access to applications
The balanced scorecard
Well-defined roles and responsibilities
People
28. Same intent as a cracker but does not have the technical skills and knowledge
Annual loss expectancy (ALE)calculations
Script kiddie
Trojan horse
Cross-site scripting attacks
29. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Penetration testing
Owner of the information asset
Monitoring processes
Use of security metrics
30. When the ________________ is more than the cost of the risk - the risk should be accepted.
Cost of control
Data classification
Undervoltage (brownout)
Data mart
31. Culture has a significant impact on how information security will be implemented in a ______________________.
A network vulnerability assessment
Virus
Performing a risk assessment
Multinational organization
32. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Applying the proper classification to the data
Properly aligned with business goals and objectives
Identify the vulnerable systems and apply compensating controls
Nondisclosure agreement (NDA)
33. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Do with the information it collects
Role-based access control
Waterfall chart
Audit objectives
34. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Control risk
Risk appetite
BIA (Business Impact Assessment
Data owners
35. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Information security manager
Knowledge management
Do with the information it collects
Personal firewall
36. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
Increase business value and confidence
Transmit e-mail messages
Properly aligned with business goals and objectives
37. The most important characteristic of good security policies is that they be ____________________.
People
Annually or whenever there is a significant change
Rule-based access control
Aligned with organizational goals
38. The MOST important element of an information security strategy.
Defined objectives
Aligned with organizational goals
Normalization
Security baselines
39. Only valid if assets have first been identified and appropriately valued.
Acceptable use policies
Annual loss expectancy (ALE)calculations
Reduce risk to an acceptable level
Calculating the value of the information or asset
40. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Information contained on the equipment
Protective switch covers
Annual loss expectancy (ALE)calculations
Exceptions to policy
41. Has full responsibility over data.
The data owner
Trusted source
Deeper level of analysis
Use of security metrics
42. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Data warehouse
Single sign-on (SSO) product
SWOT analysis
Retention of business records
43. All within the responsibility of the information security manager.
Increase business value and confidence
Platform security - intrusion detection and antivirus controls
Virus detection
Rule-based access control
44. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Classification of assets needs
The authentication process is broken
Fault-tolerant computer
Risk assessment - evaluation and impact analysis
45. Focuses on identifying vulnerabilities.
Waterfall chart
Penetration testing
Centralization of information security management
Information security manager
46. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Trojan horse
Regulatory compliance
Cross-site scripting attacks
Equal error rate (EER)
47. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Decentralization
Tailgating
The data custodian
Public key infrastructure (PKI)
48. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
MAL wear
Calculating the value of the information or asset
Do with the information it collects
Role-based access control
49. S small warehouse - designed for the end-user needs in a strategic business unit
Identify the vulnerable systems and apply compensating controls
Increase business value and confidence
Methodology used in the assessment
Data mart
50. Provides process needs but not impact.
Resource dependency assessment
Trojan horse
Well-defined roles and responsibilities
Risk appetite