Test your basic knowledge |

CISM: Certified Information Security Manager

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.






2. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.






3. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.






4. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.






5. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.






6. Primarily reduce risk and are most effective for the protection of information assets.






7. Accesses a computer or network illegally






8. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.






9. Useful but only with regard to specific technical skills.






10. When defining the information classification policy - the ___________________ need to be identified.






11. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability






12. Responsible for securing the information.






13. Identification and _______________ of business risk enables project managers to address areas with most significance.






14. S small warehouse - designed for the end-user needs in a strategic business unit






15. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.






16. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.






17. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.






18. ecurity design flaws require a ____________________.






19. Only valid if assets have first been identified and appropriately valued.






20. The MOST useful way to describe the objectives in the information security strategy is through ______________________.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


21. Has to be integrated into the requirements of every software application's design.






22. Awareness - training and physical security defenses.






23. The PRIMARY goal in developing an information security strategy is to: _________________________.






24. In order to highlight to management the importance of network security - the security manager should FIRST _______________.






25. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.






26. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.






27. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.






28. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -






29. Change management controls the _____________________. This is often the point at which a weakness will be introduced.






30. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.






31. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.






32. Programs that act without a user's knowledge and deliberately alter a computer's operations






33. The most important characteristic of good security policies is that they be ____________________.






34. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e






35. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.






36. Ensures that there are no scalability problems.






37. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


38. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.






39. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.






40. Occurs after the risk assessment process - it does not measure it.






41. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.






42. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.






43. Company or person you believe will not send a virus-infect file knowingly






44. Uses security metrics to measure the performance of the information security program.






45. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing






46. Provides strong online authentication.






47. Has full responsibility over data.






48. Without _____________________ - there cannot be accountability.






49. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.






50. Inject malformed input.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests