SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer that has duplicate components so it can continue to operate when one of its main components fail
Breakeven point of risk reduction and cost
Fault-tolerant computer
Cracker
Residual risk
2. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Access control matrix
Trusted source
Nondisclosure agreement (NDA)
The balanced scorecard
3. Inject malformed input.
Continuous analysis - monitoring and feedback
Public key infrastructure (PKI)
Cross-site scripting attacks
Performing a risk assessment
4. Has full responsibility over data.
Normalization
Digital signatures
Asset classification
The data owner
5. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Spoofing attacks
Negotiating a local version of the organization standards
Defining high-level business security requirements
Cryptographic secure sockets layer (SSL) implementations and short key lengths
6. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Transferred risk
Asset classification
Monitoring processes
Audit objectives
7. The information security manager needs to prioritize the controls based on ________________________.
Script kiddie
Developing an information security baseline
Creation of a business continuity plan
Risk management and the requirements of the organization
8. Someone who accesses a computer or network illegally
Background checks of prospective employees
Hacker
Two-factor authentication
Countermeasure cost-benefit analysis
9. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Do with the information it collects
OBusiness case development
Developing an information security baseline
Is willing to accept
10. Program that hides within or looks like a legit program
Risk assessment - evaluation and impact analysis
Trojan horse
Information security manager
Defining high-level business security requirements
11. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Owner of the information asset
Monitoring processes
Worm
Certificate authority (CA)
12. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Background checks of prospective employees
Defined objectives
Return on security investment (ROSI)
Confidentiality
13. Occurs when the incoming level
Intrusion detection system (IDS)
Gain unauthorized access to applications
Power surge/over voltage (spike)
Deeper level of analysis
14. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Undervoltage (brownout)
Risk assessment - evaluation and impact analysis
Stress testing
Protective switch covers
15. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Data mart
Gain unauthorized access to applications
Logon banners
IP address packet filtering
16. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
OBusiness case development
Information contained on the equipment
Platform security - intrusion detection and antivirus controls
Cyber terrorist
17. Without _____________________ - there cannot be accountability.
Baseline standard and then develop additional standards
Well-defined roles and responsibilities
Use of security metrics
Asset classification
18. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Nondisclosure agreement (NDA)
Security code reviews for the entire software application
Risk appetite
Internal risk assessment
19. Used to understand the flow of one process into another.
Cross-site scripting attacks
Negotiating a local version of the organization standards
Waterfall chart
Continuous analysis - monitoring and feedback
20. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Aligned with organizational goals
SWOT analysis
Process of introducing changes to systems
Safeguards over keys
21. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Data owners
BIA (Business Impact Assessment
Gain unauthorized access to applications
Centralization of information security management
22. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Audit objectives
Countermeasure cost-benefit analysis
Single sign-on (SSO) product
Comparison of cost of achievement
23. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Transmit e-mail messages
Examples of containment defenses
Control risk
Cyber extortionist
24. Same intent as a cracker but does not have the technical skills and knowledge
The information security officer
Script kiddie
Logon banners
Well-defined roles and responsibilities
25. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Tailgating
Data classification
Prioritization
Worm
26. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Risk appetite
Consensus on risks and controls
Developing an information security baseline
27. Provide metrics to which outsourcing firms can be held accountable.
Identify the relevant systems and processes
Calculating the value of the information or asset
Defined objectives
Service level agreements (SLAs)
28. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Identify the relevant systems and processes
Annually or whenever there is a significant change
Encryption of the hard disks
Get senior management onboard
29. Needs to define the access rules - which is troublesome and error prone in large organizations.
BIA (Business Impact Assessment
Rule-based access control
Well-defined roles and responsibilities
Normalization
30. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Normalization
Platform security - intrusion detection and antivirus controls
Information contained on the equipment
Developing an information security baseline
31. Information security governance models are highly dependent on the _____________________.
Malicious software and spyware
Detection defenses
Digital signatures
Overall organizational structure
32. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
BIA (Business Impact Assessment
People
Creation of a business continuity plan
Performing a risk assessment
33. Should be determined from the risk assessment results.
Audit objectives
Regular review of access control lists
Safeguards over keys
OBusiness case development
34. A notice that guarantees a user or a web site is legitimate
Digital certificate
Tie security risks to key business objectives
Background checks of prospective employees
Well-defined roles and responsibilities
35. Responsible for securing the information.
The data custodian
Trojan horse
Transmit e-mail messages
Annually or whenever there is a significant change
36. Culture has a significant impact on how information security will be implemented in a ______________________.
Return on security investment (ROSI)
The awareness and agreement of the data subjects
Multinational organization
Decentralization
37. Identification and _______________ of business risk enables project managers to address areas with most significance.
Prioritization
Personal firewall
Risk assessment - evaluation and impact analysis
Classification of assets needs
38. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Overall organizational structure
Classification of assets needs
Background checks of prospective employees
Cyber terrorist
39. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
The balanced scorecard
Defined objectives
Intrusion detection system (IDS)
Do with the information it collects
40. By definition are not previously known and therefore are undetectable.
Public key infrastructure (PKI)
0-day vulnerabilities
Gap analysis
Data warehouse
41. The data owner is responsible for _______________________.
Applying the proper classification to the data
Virus detection
Virus
Exceptions to policy
42. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Cracker
Cyber terrorist
Data isolation
Consensus on risks and controls
43. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Logon banners
Residual risk would be reduced by a greater amount
SWOT analysis
Retention of business records
44. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Support the business objectives of the organization
Background checks of prospective employees
Data isolation
Role-based policy
45. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
include security responsibilities in a job description
Role-based access control
Monitoring processes
Encryption
46. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Background checks of prospective employees
The data owner
Cyber extortionist
Threat assessment
47. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Detection defenses
Requirements of the data owners
Security risk
Patch management
48. Ensure that transmitted information can be attributed to the named sender.
Digital signatures
Transferred risk
Two-factor authentication
Script kiddie
49. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Detection defenses
Properly aligned with business goals and objectives
Data warehouse
Do with the information it collects
50. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Strategic alignment of security with business objectives
Cyber terrorist
Use of security metrics
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests