SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Do with the information it collects
0-day vulnerabilities
Trojan horse
Access control matrix
2. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Residual risk would be reduced by a greater amount
Access control matrix
Examples of containment defenses
Detection defenses
3. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
The balanced scorecard
Phishing
Overall organizational structure
4. It is easier to manage and control a _________________.
Methodology used in the assessment
Notifications and opt-out provisions
Centralized structure
Trojan horse
5. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Examples of containment defenses
Two-factor authentication
Continuous analysis - monitoring and feedback
Nondisclosure agreement (NDA)
6. Provide metrics to which outsourcing firms can be held accountable.
Inherent risk
Process of introducing changes to systems
Service level agreements (SLAs)
Return on security investment (ROSI)
7. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Identify the vulnerable systems and apply compensating controls
The information security officer
Two-factor authentication
Virus
8. Program that hides within or looks like a legit program
People
Proficiency testing
Trojan horse
Normalization
9. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
BIA (Business Impact Assessment
Stress testing
Notifications and opt-out provisions
Biometric access control systems
10. Most effective for evaluating the degree to which information security objectives are being met.
Return on security investment (ROSI)
Reduce risk to an acceptable level
Trojan horse
The balanced scorecard
11. Needs to define the access rules - which is troublesome and error prone in large organizations.
Exceptions to policy
Asset classification
Rule-based access control
Resource dependency assessment
12. Provides strong online authentication.
Strategic alignment of security with business objectives
Public key infrastructure (PKI)
Intrusion detection system (IDS)
Threat assessment
13. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Risk appetite
Increase business value and confidence
Owner of the information asset
Safeguards over keys
14. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Personal firewall
Regulatory compliance
Lack of change management
Decentralization
15. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Knowledge management
Internal risk assessment
Return on security investment (ROSI)
Access control matrix
16. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Information contained on the equipment
Inherent risk
Increase business value and confidence
Personal firewall
17. Has full responsibility over data.
Spoofing attacks
Retention of business records
Proficiency testing
The data owner
18. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Single sign-on (SSO) product
Audit objectives
OBusiness case development
Centralized structure
19. A notice that guarantees a user or a web site is legitimate
Risk management and the requirements of the organization
Proficiency testing
Audit objectives
Digital certificate
20. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Residual risk
Calculating the value of the information or asset
Two-factor authentication
Requirements of the data owners
21. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Role-based policy
Cracker
Performing a risk assessment
What happened and how the breach was resolved
22. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Residual risk would be reduced by a greater amount
Centralization of information security management
Requirements of the data owners
Personal firewall
23. Primarily reduce risk and are most effective for the protection of information assets.
Asset classification
Key controls
Impractical and is often cost-prohibitive
Developing an information security baseline
24. The information security manager needs to prioritize the controls based on ________________________.
Rule-based access control
Audit objectives
Risk management and the requirements of the organization
Monitoring processes
25. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Breakeven point of risk reduction and cost
Certificate authority (CA)
Biometric access control systems
Continuous analysis - monitoring and feedback
26. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Decentralization
Inherent risk
Intrusion detection system (IDS)
Alignment with business strategy
27. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Consensus on risks and controls
Encryption
Applying the proper classification to the data
Comparison of cost of achievement
28. By definition are not previously known and therefore are undetectable.
Security awareness training for all employees
Do with the information it collects
0-day vulnerabilities
Data owners
29. The MOST important element of an information security strategy.
Overall organizational structure
Transferred risk
What happened and how the breach was resolved
Defined objectives
30. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Information contained on the equipment
Centralization of information security management
Role-based access control
Cracker
31. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Continuous analysis - monitoring and feedback
Defined objectives
Patch management
Cyber extortionist
32. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Equal error rate (EER)
Developing an information security baseline
Regulatory compliance
Its ability to reduce or eliminate business risks
33. Risk should be reduced to a level that an organization _____________.
Encryption
Proficiency testing
Is willing to accept
Tie security risks to key business objectives
34. Someone who accesses a computer or network illegally
IP address packet filtering
Tailgating
Hacker
Performing a risk assessment
35. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Spoofing attacks
Audit objectives
Deeper level of analysis
Breakeven point of risk reduction and cost
36. Oversees the overall classification management of the information.
MAL wear
SWOT analysis
A network vulnerability assessment
The information security officer
37. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Role-based policy
Aligned with organizational goals
Key risk indicator (KRI) setup
Public key infrastructure (PKI)
38. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Transferred risk
Overall organizational structure
Methodology used in the assessment
Requirements of the data owners
39. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Countermeasure cost-benefit analysis
Regular review of access control lists
Prioritization
MAL wear
40. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Return on security investment (ROSI)
The information security officer
Identify the vulnerable systems and apply compensating controls
The database administrator
41. Inject malformed input.
Notifications and opt-out provisions
Cross-site scripting attacks
Methodology used in the assessment
Use of security metrics
42. Has to be integrated into the requirements of every software application's design.
Digital signatures
Encryption key management
Skills inventory
Normalization
43. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Threat assessment
Data mart
Skills inventory
Residual risk
44. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Exceptions to policy
Comparison of cost of achievement
Notifications and opt-out provisions
Creation of a business continuity plan
45. Used to understand the flow of one process into another.
IP address packet filtering
Waterfall chart
Key risk indicator (KRI) setup
Impractical and is often cost-prohibitive
46. Culture has a significant impact on how information security will be implemented in a ______________________.
Do with the information it collects
Multinational organization
Resource dependency assessment
Defined objectives
47. Without _____________________ - there cannot be accountability.
The awareness and agreement of the data subjects
Calculating the value of the information or asset
Well-defined roles and responsibilities
Waterfall chart
48. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Gain unauthorized access to applications
Inherent risk
Trojan horse
Nondisclosure agreement (NDA)
49. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Background checks of prospective employees
Breakeven point of risk reduction and cost
Worm
The awareness and agreement of the data subjects
50. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Overall organizational structure
Regular review of access control lists
Threat assessment
Comparison of cost of achievement