SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Negotiating a local version of the organization standards
Biometric access control systems
Security awareness training for all employees
SWOT analysis
2. Ensures that there are no scalability problems.
Background checks of prospective employees
Continuous analysis - monitoring and feedback
Stress testing
Aligned with organizational goals
3. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Encryption of the hard disks
Impractical and is often cost-prohibitive
Biometric access control systems
Prioritization
4. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Retention of business records
Transferred risk
Reduce risk to an acceptable level
Worm
5. Whenever personal data are transferred across national boundaries; ________________________ are required.
The awareness and agreement of the data subjects
Background checks of prospective employees
Virus
Confidentiality
6. The PRIMARY goal in developing an information security strategy is to: _________________________.
Developing an information security baseline
Role-based access control
Trusted source
Support the business objectives of the organization
7. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
OBusiness case development
Annual loss expectancy (ALE)calculations
Protective switch covers
Skills inventory
8. A key indicator of performance measurement.
Confidentiality
IP address packet filtering
Strategic alignment of security with business objectives
Lack of change management
9. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Identify the relevant systems and processes
Increase business value and confidence
Virus detection
0-day vulnerabilities
10. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Overall organizational structure
People
Worm
Security baselines
11. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Resource dependency assessment
Multinational organization
Worm
Vulnerability assessment
12. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Knowledge management
Public key infrastructure (PKI)
Phishing
Risk assessment - evaluation and impact analysis
13. Utility program that detects and protects a personal computer from unauthorized intrusions
Encryption key management
Personal firewall
IP address packet filtering
Transferred risk
14. Occurs when the incoming level
Calculating the value of the information or asset
Attributes and characteristics of the 'desired state'
Power surge/over voltage (spike)
Applying the proper classification to the data
15. Only valid if assets have first been identified and appropriately valued.
Inherent risk
Prioritization
Centralized structure
Annual loss expectancy (ALE)calculations
16. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Regulatory compliance
Information contained on the equipment
Negotiating a local version of the organization standards
Properly aligned with business goals and objectives
17. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Aligned with organizational goals
Notifications and opt-out provisions
What happened and how the breach was resolved
Spoofing attacks
18. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
19. Most effective for evaluating the degree to which information security objectives are being met.
Skills inventory
Rule-based access control
Role-based access control
The balanced scorecard
20. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Alignment with business strategy
Annually or whenever there is a significant change
Gain unauthorized access to applications
Security risk
21. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Security risk
Digital signatures
Biometric access control systems
Defining high-level business security requirements
22. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Transferred risk
Monitoring processes
Prioritization
Personal firewall
23. To identify known vulnerabilities based on common misconfigurations and missing updates.
Key risk indicator (KRI) setup
Audit objectives
A network vulnerability assessment
Two-factor authentication
24. Useful but only with regard to specific technical skills.
Proficiency testing
Detection defenses
Control effectiveness
Rule-based access control
25. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Baseline standard and then develop additional standards
Exceptions to policy
Its ability to reduce or eliminate business risks
Intrusion detection system (IDS)
26. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Developing an information security baseline
Control risk
Phishing
Transmit e-mail messages
27. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Countermeasure cost-benefit analysis
Residual risk
Equal error rate (EER)
BIA (Business Impact Assessment
28. Should PRIMARILY be based on regulatory and legal requirements.
Centralized structure
Retention of business records
Certificate authority (CA)
Continuous monitoring control initiatives
29. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Applying the proper classification to the data
The data custodian
Residual risk
Requirements of the data owners
30. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Security code reviews for the entire software application
Centralization of information security management
Transferred risk
Equal error rate (EER)
31. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Defined objectives
Virus
Asset classification
Total cost of ownership (TCO)
32. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
The database administrator
Is willing to accept
Process of introducing changes to systems
Continuous monitoring control initiatives
33. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Security code reviews for the entire software application
Power surge/over voltage (spike)
Transmit e-mail messages
Performing a risk assessment
34. Provide metrics to which outsourcing firms can be held accountable.
Information contained on the equipment
Service level agreements (SLAs)
Information security manager
Identify the vulnerable systems and apply compensating controls
35. Uses security metrics to measure the performance of the information security program.
Decentralization
Residual risk would be reduced by a greater amount
Cracker
Information security manager
36. The best measure for preventing the unauthorized disclosure of confidential information.
Key controls
Multinational organization
Acceptable use policies
Annually or whenever there is a significant change
37. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Notifications and opt-out provisions
Public key infrastructure (PKI)
Role-based access control
Background checks of prospective employees
38. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Do with the information it collects
Tailgating
Deeper level of analysis
Protective switch covers
39. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Monitoring processes
Background check
Trusted source
Assess the risks to the business operation
40. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Digital certificate
Gap analysis
Certificate authority (CA)
Requirements of the data owners
41. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
OBusiness case development
People
Centralized structure
Inherent risk
42. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
The information security officer
Centralization of information security management
Inherent risk
Owner of the information asset
43. New security ulnerabilities should be managed through a ________________.
Internal risk assessment
Patch management process
Encryption
Centralization of information security management
44. Occurs after the risk assessment process - it does not measure it.
Compliance with the organization's information security requirements
Negotiating a local version of the organization standards
Aligned with organizational goals
Use of security metrics
45. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Information security manager
Safeguards over keys
Transmit e-mail messages
Logon banners
46. The primary role of the information security manager in the process of information classification within the organization.
Gain unauthorized access to applications
Knowledge management
Defining and ratifying the classification structure of information assets
Annually or whenever there is a significant change
47. An information security manager has to impress upon the human resources department the need for _____________________.
Security awareness training for all employees
Key controls
Digital certificate
Public key infrastructure (PKI)
48. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Monitoring processes
Annual loss expectancy (ALE)calculations
Return on security investment (ROSI)
49. ecurity design flaws require a ____________________.
Deeper level of analysis
Rule-based access control
Security awareness training for all employees
Hacker
50. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Performing a risk assessment
Power surge/over voltage (spike)
Negotiating a local version of the organization standards
Well-defined roles and responsibilities