SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Safeguards over keys
Total cost of ownership (TCO)
Gain unauthorized access to applications
Background checks of prospective employees
2. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Countermeasure cost-benefit analysis
Reduce risk to an acceptable level
Data isolation
Prioritization
3. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Examples of containment defenses
Centralized structure
Internal risk assessment
Identify the relevant systems and processes
4. Provide metrics to which outsourcing firms can be held accountable.
SWOT analysis
Intrusion detection system (IDS)
Service level agreements (SLAs)
Data owners
5. Only valid if assets have first been identified and appropriately valued.
Security code reviews for the entire software application
Phishing
Requirements of the data owners
Annual loss expectancy (ALE)calculations
6. Reducing risk to a level too small to measure is _______________.
Impractical and is often cost-prohibitive
Data warehouse
Conduct a risk assessment
SWOT analysis
7. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Acceptable use policies
OBusiness case development
Identify the relevant systems and processes
8. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Annually or whenever there is a significant change
Deeper level of analysis
Key risk indicator (KRI) setup
Owner of the information asset
9. New security ulnerabilities should be managed through a ________________.
Worm
Regular review of access control lists
Patch management process
Hacker
10. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Asset classification
Internal risk assessment
Baseline standard and then develop additional standards
Digital signatures
11. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. When the ________________ is more than the cost of the risk - the risk should be accepted.
Reduce risk to an acceptable level
Exceptions to policy
Increase business value and confidence
Cost of control
13. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
OBusiness case development
Increase business value and confidence
Attributes and characteristics of the 'desired state'
People
14. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Support the business objectives of the organization
Requirements of the data owners
Undervoltage (brownout)
Risk assessment - evaluation and impact analysis
15. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Rule-based access control
Countermeasure cost-benefit analysis
Asset classification
Spoofing attacks
16. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Risk appetite
Proficiency testing
Notifications and opt-out provisions
A network vulnerability assessment
17. Occurs when the electrical supply drops
Tailgating
Intrusion detection system (IDS)
Penetration testing
Undervoltage (brownout)
18. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Requirements of the data owners
Decentralization
Continuous monitoring control initiatives
Defining high-level business security requirements
19. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Decentralization
Attributes and characteristics of the 'desired state'
The authentication process is broken
Proficiency testing
20. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Data warehouse
Cryptographic secure sockets layer (SSL) implementations and short key lengths
The data owner
Methodology used in the assessment
21. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Worm
Key controls
22. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Consensus on risks and controls
Rule-based access control
Power surge/over voltage (spike)
Waterfall chart
23. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Get senior management onboard
Deeper level of analysis
Security baselines
Gain unauthorized access to applications
24. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Service level agreements (SLAs)
Cyber extortionist
Cracker
Monitoring processes
25. By definition are not previously known and therefore are undetectable.
SWOT analysis
0-day vulnerabilities
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Tailgating
26. Ensure that transmitted information can be attributed to the named sender.
Encryption
Digital signatures
Calculating the value of the information or asset
Exceptions to policy
27. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Control risk
Vulnerability assessment
Comparison of cost of achievement
Prioritization
28. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Countermeasure cost-benefit analysis
Proficiency testing
Compliance with the organization's information security requirements
The board of directors and senior management
29. Utility program that detects and protects a personal computer from unauthorized intrusions
Transferred risk
Vulnerability assessment
Personal firewall
Equal error rate (EER)
30. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
All personnel
Safeguards over keys
Data owners
Consensus on risks and controls
31. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Proficiency testing
Security risk
Cracker
Residual risk would be reduced by a greater amount
32. Same intent as a cracker but does not have the technical skills and knowledge
Script kiddie
Digital certificate
Trojan horse
Exceptions to policy
33. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Spoofing attacks
BIA (Business Impact Assessment
Strategic alignment of security with business objectives
Encryption
34. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Regular review of access control lists
Single sign-on (SSO) product
Defined objectives
Decentralization
35. Risk should be reduced to a level that an organization _____________.
Role-based policy
Risk management and the requirements of the organization
Is willing to accept
Consensus on risks and controls
36. Should be determined from the risk assessment results.
Audit objectives
Control risk
Methodology used in the assessment
Script kiddie
37. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Classification of assets needs
Increase business value and confidence
Reduce risk to an acceptable level
Cyber terrorist
38. Should be performed to identify the risk and determine needed controls.
Internal risk assessment
include security responsibilities in a job description
Identify the relevant systems and processes
Digital certificate
39. The PRIMARY goal in developing an information security strategy is to: _________________________.
Threat assessment
Support the business objectives of the organization
Background check
Cross-site scripting attacks
40. The best measure for preventing the unauthorized disclosure of confidential information.
Risk assessment - evaluation and impact analysis
Exceptions to policy
Acceptable use policies
Annual loss expectancy (ALE)calculations
41. Applications cannot access data associated with other apps
Defining high-level business security requirements
Background checks of prospective employees
Data isolation
Waterfall chart
42. It is easier to manage and control a _________________.
Centralized structure
Assess the risks to the business operation
Total cost of ownership (TCO)
Nondisclosure agreement (NDA)
43. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Audit objectives
Get senior management onboard
Is willing to accept
Phishing
44. Most effective for evaluating the degree to which information security objectives are being met.
The balanced scorecard
Cost of control
Encryption of the hard disks
Resource dependency assessment
45. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Public key infrastructure (PKI)
Data isolation
Lack of change management
Strategic alignment of security with business objectives
46. Awareness - training and physical security defenses.
Penetration testing
Examples of containment defenses
Data classification
Script kiddie
47. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Owner of the information asset
Intrusion detection system (IDS)
Monitoring processes
Support the business objectives of the organization
48. ecurity design flaws require a ____________________.
Deeper level of analysis
Performing a risk assessment
Data mart
Encryption of the hard disks
49. Whenever personal data are transferred across national boundaries; ________________________ are required.
Internal risk assessment
Creation of a business continuity plan
Its ability to reduce or eliminate business risks
The awareness and agreement of the data subjects
50. Cannot be minimized
Equal error rate (EER)
Inherent risk
Continuous analysis - monitoring and feedback
Cyber terrorist