SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides strong online authentication.
Public key infrastructure (PKI)
Return on security investment (ROSI)
Regular review of access control lists
Conduct a risk assessment
2. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Encryption
Logon banners
Control risk
Penetration testing
3. Should be performed to identify the risk and determine needed controls.
Undervoltage (brownout)
Internal risk assessment
Information security manager
Encryption
4. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Calculating the value of the information or asset
Total cost of ownership (TCO)
Attributes and characteristics of the 'desired state'
Return on security investment (ROSI)
5. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Overall organizational structure
Assess the risks to the business operation
Virus detection
Public key infrastructure (PKI)
6. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Aligned with organizational goals
Data owners
Countermeasure cost-benefit analysis
Proficiency testing
7. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
The authentication process is broken
Centralized structure
Public key infrastructure (PKI)
Consensus on risks and controls
8. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Acceptable use policies
BIA (Business Impact Assessment
Its ability to reduce or eliminate business risks
Encryption
9. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Spoofing attacks
The awareness and agreement of the data subjects
Protective switch covers
Consensus on risks and controls
10. Would protect against spoofing an internal address but would not provide strong authentication.
Monitoring processes
IP address packet filtering
Hacker
Data isolation
11. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Annually or whenever there is a significant change
Nondisclosure agreement (NDA)
Exceptions to policy
Attributes and characteristics of the 'desired state'
12. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Background checks of prospective employees
Examples of containment defenses
Platform security - intrusion detection and antivirus controls
Certificate authority (CA)
13. Awareness - training and physical security defenses.
Examples of containment defenses
Security baselines
Power surge/over voltage (spike)
The database administrator
14. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Phishing
Transferred risk
Digital signatures
15. S small warehouse - designed for the end-user needs in a strategic business unit
Centralized structure
Data mart
Access control matrix
Aligned with organizational goals
16. Uses security metrics to measure the performance of the information security program.
Fault-tolerant computer
Comparison of cost of achievement
Information security manager
Key controls
17. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Security baselines
Regulatory compliance
Resource dependency assessment
Is willing to accept
18. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Compliance with the organization's information security requirements
Security risk
Conduct a risk assessment
Methodology used in the assessment
19. Computer that has duplicate components so it can continue to operate when one of its main components fail
Patch management
Fault-tolerant computer
Return on security investment (ROSI)
Security code reviews for the entire software application
20. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Methodology used in the assessment
Transferred risk
The information security officer
Control risk
21. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Intrusion detection system (IDS)
Tie security risks to key business objectives
Background checks of prospective employees
Notifications and opt-out provisions
22. When the ________________ is more than the cost of the risk - the risk should be accepted.
Internal risk assessment
Attributes and characteristics of the 'desired state'
Deeper level of analysis
Cost of control
23. Occurs when the electrical supply drops
Penetration testing
Malicious software and spyware
Undervoltage (brownout)
Encryption key management
24. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Spoofing attacks
Risk assessment - evaluation and impact analysis
Data classification
IP address packet filtering
25. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Multinational organization
Creation of a business continuity plan
Background checks of prospective employees
Identify the relevant systems and processes
26. Oversees the overall classification management of the information.
Owner of the information asset
The information security officer
Audit objectives
What happened and how the breach was resolved
27. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Risk appetite
Penetration testing
Encryption
Patch management
28. The best measure for preventing the unauthorized disclosure of confidential information.
Information security manager
Increase business value and confidence
Acceptable use policies
Worm
29. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Examples of containment defenses
Data owners
Digital certificate
Risk assessment - evaluation and impact analysis
30. Someone who uses the internet or network to destroy or damage computers for political reasons
All personnel
Audit objectives
Transferred risk
Cyber terrorist
31. Ensures that there are no scalability problems.
Regular review of access control lists
Creation of a business continuity plan
Stress testing
Defining and ratifying the classification structure of information assets
32. Utility program that detects and protects a personal computer from unauthorized intrusions
Total cost of ownership (TCO)
Annually or whenever there is a significant change
Personal firewall
Is willing to accept
33. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Identify the vulnerable systems and apply compensating controls
Internal risk assessment
Cracker
Safeguards over keys
34. Information security governance models are highly dependent on the _____________________.
Internal risk assessment
Support the business objectives of the organization
Overall organizational structure
Script kiddie
35. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Digital certificate
Malicious software and spyware
The information security officer
Monitoring processes
36. A risk assessment should be conducted _________________.
Support the business objectives of the organization
Patch management process
Annually or whenever there is a significant change
Key risk indicator (KRI) setup
37. Has full responsibility over data.
Baseline standard and then develop additional standards
Overall organizational structure
The data owner
Process of introducing changes to systems
38. When defining the information classification policy - the ___________________ need to be identified.
Examples of containment defenses
Requirements of the data owners
Cracker
Logon banners
39. Should PRIMARILY be based on regulatory and legal requirements.
Attributes and characteristics of the 'desired state'
Retention of business records
Assess the risks to the business operation
Gain unauthorized access to applications
40. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Risk assessment - evaluation and impact analysis
The authentication process is broken
Control effectiveness
Biometric access control systems
41. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
OBusiness case development
Patch management process
Background checks of prospective employees
Residual risk
42. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Performing a risk assessment
Skills inventory
Methodology used in the assessment
Well-defined roles and responsibilities
43. Accesses a computer or network illegally
Data warehouse
Cracker
Malicious software and spyware
Confidentiality
44. Provides process needs but not impact.
Resource dependency assessment
Encryption of the hard disks
Security risk
Defining and ratifying the classification structure of information assets
45. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Script kiddie
Annually or whenever there is a significant change
Logon banners
OBusiness case development
46. A method for analyzing and reducing a relational database to its most streamlined form
Owner of the information asset
Normalization
Impractical and is often cost-prohibitive
Defining and ratifying the classification structure of information assets
47. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Baseline standard and then develop additional standards
Identify the vulnerable systems and apply compensating controls
MAL wear
A network vulnerability assessment
48. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
Use of security metrics
Monitoring processes
Vulnerability assessment
49. Has to be integrated into the requirements of every software application's design.
Increase business value and confidence
Notifications and opt-out provisions
Encryption key management
Role-based access control
50. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
BIA (Business Impact Assessment
Consensus on risks and controls
Risk management and the requirements of the organization
Deeper level of analysis