SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The MOST important element of an information security strategy.
Trojan horse
Defined objectives
Threat assessment
Performing a risk assessment
2. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Total cost of ownership (TCO)
Increase business value and confidence
Data classification
Get senior management onboard
3. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Role-based policy
Methodology used in the assessment
Continuous analysis - monitoring and feedback
The data owner
4. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Centralization of information security management
Cross-site scripting attacks
Monitoring processes
5. Would protect against spoofing an internal address but would not provide strong authentication.
BIA (Business Impact Assessment
IP address packet filtering
Tailgating
Biometric access control systems
6. Carries out the technical administration.
Risk management and the requirements of the organization
The database administrator
Information contained on the equipment
Role-based access control
7. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
All personnel
Security awareness training for all employees
Acceptable use policies
Worm
8. Should be performed to identify the risk and determine needed controls.
Transmit e-mail messages
Internal risk assessment
Deeper level of analysis
Data isolation
9. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Total cost of ownership (TCO)
Creation of a business continuity plan
Requirements of the data owners
The authentication process is broken
10. Whenever personal data are transferred across national boundaries; ________________________ are required.
Cracker
Its ability to reduce or eliminate business risks
Methodology used in the assessment
The awareness and agreement of the data subjects
11. A key indicator of performance measurement.
Strategic alignment of security with business objectives
Deeper level of analysis
Assess the risks to the business operation
Security code reviews for the entire software application
12. The PRIMARY goal in developing an information security strategy is to: _________________________.
Data classification
Internal risk assessment
Support the business objectives of the organization
Continuous monitoring control initiatives
13. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Aligned with organizational goals
MAL wear
Methodology used in the assessment
All personnel
14. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Reduce risk to an acceptable level
Data isolation
BIA (Business Impact Assessment
Inherent risk
15. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Tie security risks to key business objectives
MAL wear
Virus detection
People
16. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Detection defenses
Multinational organization
Calculating the value of the information or asset
17. All within the responsibility of the information security manager.
Security baselines
Methodology used in the assessment
Platform security - intrusion detection and antivirus controls
Decentralization
18. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Key risk indicator (KRI) setup
Impractical and is often cost-prohibitive
Control risk
Cyber terrorist
19. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Intrusion detection system (IDS)
Safeguards over keys
Data classification
Security awareness training for all employees
20. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Knowledge management
Overall organizational structure
Control risk
Comparison of cost of achievement
21. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Virus detection
A network vulnerability assessment
Fault-tolerant computer
Process of introducing changes to systems
22. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Performing a risk assessment
Examples of containment defenses
OBusiness case development
Background check
23. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Examples of containment defenses
Security risk
Reduce risk to an acceptable level
Security baselines
24. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Trusted source
Cracker
Knowledge management
Continuous analysis - monitoring and feedback
25. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Return on security investment (ROSI)
Residual risk would be reduced by a greater amount
Security baselines
Notifications and opt-out provisions
26. Utility program that detects and protects a personal computer from unauthorized intrusions
Personal firewall
Threat assessment
Normalization
All personnel
27. ecurity design flaws require a ____________________.
Deeper level of analysis
Alignment with business strategy
Equal error rate (EER)
Prioritization
28. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Owner of the information asset
Classification of assets needs
Penetration testing
Impractical and is often cost-prohibitive
29. Most effective for evaluating the degree to which information security objectives are being met.
The balanced scorecard
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Assess the risks to the business operation
Vulnerability assessment
30. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Well-defined roles and responsibilities
Regulatory compliance
Strategic alignment of security with business objectives
Cyber extortionist
31. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Annual loss expectancy (ALE)calculations
Owner of the information asset
Gain unauthorized access to applications
Virus
32. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Resource dependency assessment
Asset classification
Return on security investment (ROSI)
The authentication process is broken
33. New security ulnerabilities should be managed through a ________________.
SWOT analysis
Patch management process
Asset classification
Trojan horse
34. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Transferred risk
Performing a risk assessment
Exceptions to policy
Access control matrix
35. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Background checks of prospective employees
Hacker
Encryption key management
Monitoring processes
36. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Prioritization
A network vulnerability assessment
Transmit e-mail messages
Its ability to reduce or eliminate business risks
37. Provide metrics to which outsourcing firms can be held accountable.
Service level agreements (SLAs)
Threat assessment
Process of introducing changes to systems
Prioritization
38. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Digital certificate
Well-defined roles and responsibilities
Gap analysis
Developing an information security baseline
39. The most important characteristic of good security policies is that they be ____________________.
Return on security investment (ROSI)
Role-based access control
Calculating the value of the information or asset
Aligned with organizational goals
40. A notice that guarantees a user or a web site is legitimate
Security code reviews for the entire software application
Acceptable use policies
Digital certificate
Deeper level of analysis
41. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Assess the risks to the business operation
Breakeven point of risk reduction and cost
Multinational organization
Defining high-level business security requirements
42. A method for analyzing and reducing a relational database to its most streamlined form
Virus detection
Normalization
Protective switch covers
Skills inventory
43. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Risk appetite
Baseline standard and then develop additional standards
Impractical and is often cost-prohibitive
The awareness and agreement of the data subjects
44. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Security code reviews for the entire software application
Defined objectives
Monitoring processes
Baseline standard and then develop additional standards
45. Occurs after the risk assessment process - it does not measure it.
Use of security metrics
Properly aligned with business goals and objectives
Examples of containment defenses
The awareness and agreement of the data subjects
46. When defining the information classification policy - the ___________________ need to be identified.
Identify the vulnerable systems and apply compensating controls
Requirements of the data owners
Baseline standard and then develop additional standards
Rule-based access control
47. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Normalization
Conduct a risk assessment
Centralization of information security management
The data custodian
48. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Consensus on risks and controls
Role-based policy
Normalization
Developing an information security baseline
49. The primary role of the information security manager in the process of information classification within the organization.
Safeguards over keys
Digital signatures
Normalization
Defining and ratifying the classification structure of information assets
50. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Nondisclosure agreement (NDA)
Patch management
Defining and ratifying the classification structure of information assets
Regulatory compliance