SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses security metrics to measure the performance of the information security program.
Information security manager
People
Information contained on the equipment
Use of security metrics
2. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. Program that hides within or looks like a legit program
Defined objectives
Trojan horse
SWOT analysis
Strategic alignment of security with business objectives
4. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Audit objectives
Identify the vulnerable systems and apply compensating controls
Threat assessment
Impractical and is often cost-prohibitive
5. A Successful risk management should lead to a ________________.
Centralized structure
Breakeven point of risk reduction and cost
Risk assessment - evaluation and impact analysis
Lack of change management
6. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Performing a risk assessment
The board of directors and senior management
Overall organizational structure
7. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Trusted source
Baseline standard and then develop additional standards
Monitoring processes
Get senior management onboard
8. By definition are not previously known and therefore are undetectable.
Cyber terrorist
Information contained on the equipment
0-day vulnerabilities
Data mart
9. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Control risk
Impractical and is often cost-prohibitive
Biometric access control systems
The data owner
10. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
The balanced scorecard
Virus
Cracker
Negotiating a local version of the organization standards
11. Provides process needs but not impact.
Impractical and is often cost-prohibitive
Two-factor authentication
Properly aligned with business goals and objectives
Resource dependency assessment
12. S small warehouse - designed for the end-user needs in a strategic business unit
Protective switch covers
Deeper level of analysis
Countermeasure cost-benefit analysis
Data mart
13. Should PRIMARILY be based on regulatory and legal requirements.
Return on security investment (ROSI)
Trusted source
Continuous monitoring control initiatives
Retention of business records
14. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Get senior management onboard
Information security manager
Security risk
A network vulnerability assessment
15. Ensure that transmitted information can be attributed to the named sender.
Data isolation
Monitoring processes
Deeper level of analysis
Digital signatures
16. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Data mart
Encryption of the hard disks
Requirements of the data owners
Return on security investment (ROSI)
17. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Continuous analysis - monitoring and feedback
Defining high-level business security requirements
Cross-site scripting attacks
Monitoring processes
18. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Acceptable use policies
Security baselines
Get senior management onboard
Retention of business records
19. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
BIA (Business Impact Assessment
Threat assessment
Decentralization
Knowledge management
20. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Script kiddie
Spoofing attacks
Exceptions to policy
Protective switch covers
21. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Resource dependency assessment
Script kiddie
Creation of a business continuity plan
Notifications and opt-out provisions
22. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Worm
Exceptions to policy
Trusted source
Protective switch covers
23. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Cyber extortionist
Centralization of information security management
Calculating the value of the information or asset
Transferred risk
24. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Nondisclosure agreement (NDA)
Proficiency testing
Safeguards over keys
Asset classification
25. Used to understand the flow of one process into another.
Asset classification
Compliance with the organization's information security requirements
Waterfall chart
Data mart
26. Should be performed to identify the risk and determine needed controls.
Two-factor authentication
The database administrator
Performing a risk assessment
Internal risk assessment
27. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
Security awareness training for all employees
Service level agreements (SLAs)
Gain unauthorized access to applications
28. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Calculating the value of the information or asset
Virus
Detection defenses
Vulnerability assessment
29. The PRIMARY goal in developing an information security strategy is to: _________________________.
Key risk indicator (KRI) setup
Support the business objectives of the organization
Multinational organization
Rule-based access control
30. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
BIA (Business Impact Assessment
Attributes and characteristics of the 'desired state'
Access control matrix
Creation of a business continuity plan
31. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
OBusiness case development
Gain unauthorized access to applications
Decentralization
Digital certificate
32. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Transmit e-mail messages
Phishing
Do with the information it collects
33. A key indicator of performance measurement.
Data isolation
include security responsibilities in a job description
Strategic alignment of security with business objectives
Cryptographic secure sockets layer (SSL) implementations and short key lengths
34. Carries out the technical administration.
Biometric access control systems
The database administrator
Regulatory compliance
Malicious software and spyware
35. Would protect against spoofing an internal address but would not provide strong authentication.
Calculating the value of the information or asset
Internal risk assessment
IP address packet filtering
All personnel
36. Inject malformed input.
SWOT analysis
Service level agreements (SLAs)
Security risk
Cross-site scripting attacks
37. A method for analyzing and reducing a relational database to its most streamlined form
Conduct a risk assessment
Requirements of the data owners
Normalization
Residual risk
38. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Cross-site scripting attacks
The board of directors and senior management
Data owners
Calculating the value of the information or asset
39. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Well-defined roles and responsibilities
Baseline standard and then develop additional standards
Transferred risk
Assess the risks to the business operation
40. Most effective for evaluating the degree to which information security objectives are being met.
Role-based policy
Breakeven point of risk reduction and cost
BIA (Business Impact Assessment
The balanced scorecard
41. Risk should be reduced to a level that an organization _____________.
Role-based policy
Is willing to accept
Key controls
Encryption of the hard disks
42. Provides strong online authentication.
Public key infrastructure (PKI)
Performing a risk assessment
Service level agreements (SLAs)
Defined objectives
43. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Retention of business records
People
Gain unauthorized access to applications
Access control matrix
44. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Process of introducing changes to systems
Public key infrastructure (PKI)
Worm
Baseline standard and then develop additional standards
45. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Information contained on the equipment
Conduct a risk assessment
Overall organizational structure
Lack of change management
46. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Key risk indicator (KRI) setup
Return on security investment (ROSI)
Cross-site scripting attacks
Digital signatures
47. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Strategic alignment of security with business objectives
Worm
Data owners
Equal error rate (EER)
48. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Increase business value and confidence
Virus
Logon banners
Virus detection
49. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Increase business value and confidence
Safeguards over keys
Undervoltage (brownout)
Confidentiality
50. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Encryption
Acceptable use policies
Control risk
Encryption of the hard disks