SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A repository of historical data organized by subject to support decision makers in the org
Virus detection
Data warehouse
Assess the risks to the business operation
Rule-based access control
2. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Trusted source
IP address packet filtering
Use of security metrics
Increase business value and confidence
3. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Asset classification
Risk appetite
Cost of control
Increase business value and confidence
4. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Cross-site scripting attacks
Two-factor authentication
Risk assessment - evaluation and impact analysis
Cyber extortionist
5. All within the responsibility of the information security manager.
Script kiddie
Support the business objectives of the organization
Platform security - intrusion detection and antivirus controls
The data owner
6. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
OBusiness case development
Encryption of the hard disks
Overall organizational structure
MAL wear
7. A notice that guarantees a user or a web site is legitimate
Calculating the value of the information or asset
Asset classification
Applying the proper classification to the data
Digital certificate
8. Computer that has duplicate components so it can continue to operate when one of its main components fail
Power surge/over voltage (spike)
Baseline standard and then develop additional standards
Protective switch covers
Fault-tolerant computer
9. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
The board of directors and senior management
Is willing to accept
Virus
Data classification
10. Accesses a computer or network illegally
Residual risk would be reduced by a greater amount
Its ability to reduce or eliminate business risks
Cracker
What happened and how the breach was resolved
11. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
BIA (Business Impact Assessment
Audit objectives
Transferred risk
Virus detection
12. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Continuous monitoring control initiatives
Resource dependency assessment
What happened and how the breach was resolved
Intrusion detection system (IDS)
13. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Data owners
Breakeven point of risk reduction and cost
Performing a risk assessment
Detection defenses
14. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
The board of directors and senior management
The authentication process is broken
Annually or whenever there is a significant change
Safeguards over keys
15. Identification and _______________ of business risk enables project managers to address areas with most significance.
IP address packet filtering
Prioritization
Key risk indicator (KRI) setup
Annually or whenever there is a significant change
16. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Consensus on risks and controls
Classification of assets needs
Gain unauthorized access to applications
The data custodian
17. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
The data owner
Security baselines
Process of introducing changes to systems
Hacker
18. Used to understand the flow of one process into another.
Retention of business records
Waterfall chart
Gap analysis
Security baselines
19. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Developing an information security baseline
Classification of assets needs
Spoofing attacks
Annually or whenever there is a significant change
20. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Gap analysis
Stress testing
Impractical and is often cost-prohibitive
Digital signatures
21. Culture has a significant impact on how information security will be implemented in a ______________________.
Requirements of the data owners
Key risk indicator (KRI) setup
Data owners
Multinational organization
22. Focuses on identifying vulnerabilities.
Control risk
Penetration testing
Impractical and is often cost-prohibitive
Worm
23. Provides strong online authentication.
Public key infrastructure (PKI)
Malicious software and spyware
Proficiency testing
Control effectiveness
24. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
Notifications and opt-out provisions
Identify the vulnerable systems and apply compensating controls
Certificate authority (CA)
25. S small warehouse - designed for the end-user needs in a strategic business unit
Virus
Data mart
Applying the proper classification to the data
Baseline standard and then develop additional standards
26. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Properly aligned with business goals and objectives
Tie security risks to key business objectives
Baseline standard and then develop additional standards
Assess the risks to the business operation
27. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Monitoring processes
IP address packet filtering
Digital signatures
Security code reviews for the entire software application
28. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Phishing
Role-based access control
Annually or whenever there is a significant change
Security risk
29. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Protective switch covers
Equal error rate (EER)
Data classification
30. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Virus detection
SWOT analysis
Inherent risk
Regulatory compliance
31. Inject malformed input.
Detection defenses
Is willing to accept
Cross-site scripting attacks
Role-based access control
32. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
Background checks of prospective employees
Encryption key management
Monitoring processes
33. Occurs when the electrical supply drops
Vulnerability assessment
Total cost of ownership (TCO)
Residual risk would be reduced by a greater amount
Undervoltage (brownout)
34. Needs to define the access rules - which is troublesome and error prone in large organizations.
Risk management and the requirements of the organization
Strategic alignment of security with business objectives
0-day vulnerabilities
Rule-based access control
35. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Exceptions to policy
Phishing
Information security manager
Confidentiality
36. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Key controls
Use of security metrics
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Deeper level of analysis
37. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Process of introducing changes to systems
Single sign-on (SSO) product
Applying the proper classification to the data
Risk management and the requirements of the organization
38. Most effective for evaluating the degree to which information security objectives are being met.
Fault-tolerant computer
Residual risk would be reduced by a greater amount
Use of security metrics
The balanced scorecard
39. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Reduce risk to an acceptable level
Get senior management onboard
Use of security metrics
Security baselines
40. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Deeper level of analysis
Reduce risk to an acceptable level
Equal error rate (EER)
Residual risk
41. To identify known vulnerabilities based on common misconfigurations and missing updates.
Information contained on the equipment
Process of introducing changes to systems
Safeguards over keys
A network vulnerability assessment
42. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Defining and ratifying the classification structure of information assets
Conduct a risk assessment
Access control matrix
Encryption
43. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Tailgating
Cyber terrorist
Conduct a risk assessment
Owner of the information asset
44. Occurs when the incoming level
Power surge/over voltage (spike)
Data mart
Spoofing attacks
Data isolation
45. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Worm
Requirements of the data owners
Countermeasure cost-benefit analysis
Notifications and opt-out provisions
46. By definition are not previously known and therefore are undetectable.
Phishing
0-day vulnerabilities
Annually or whenever there is a significant change
Decentralization
47. An information security manager has to impress upon the human resources department the need for _____________________.
Security awareness training for all employees
Tie security risks to key business objectives
Penetration testing
Security code reviews for the entire software application
48. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
Skills inventory
Cyber terrorist
Cross-site scripting attacks
49. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Risk appetite
Data classification
Knowledge management
Creation of a business continuity plan
50. Programs that act without a user's knowledge and deliberately alter a computer's operations
Encryption
MAL wear
Single sign-on (SSO) product
Background check
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests