SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Confidentiality
Is willing to accept
Control effectiveness
Gap analysis
2. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
The information security officer
The authentication process is broken
Calculating the value of the information or asset
Access control matrix
3. Cannot be minimized
Defined objectives
Multinational organization
Inherent risk
Data warehouse
4. Information security governance models are highly dependent on the _____________________.
Overall organizational structure
Retention of business records
Risk management and the requirements of the organization
Compliance with the organization's information security requirements
5. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Conduct a risk assessment
Virus
Continuous monitoring control initiatives
Trojan horse
6. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Risk assessment - evaluation and impact analysis
Two-factor authentication
Spoofing attacks
Is willing to accept
7. Inject malformed input.
Cross-site scripting attacks
Cracker
Information contained on the equipment
Transmit e-mail messages
8. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Risk management and the requirements of the organization
Data isolation
Centralized structure
Continuous analysis - monitoring and feedback
9. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Access control matrix
Vulnerability assessment
Patch management
Background check
10. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
What happened and how the breach was resolved
Strategic alignment of security with business objectives
Safeguards over keys
Security awareness training for all employees
11. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Worm
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Identify the relevant systems and processes
Encryption of the hard disks
12. Carries out the technical administration.
Tie security risks to key business objectives
The database administrator
MAL wear
Background check
13. Has to be integrated into the requirements of every software application's design.
Encryption key management
Inherent risk
Role-based access control
The data owner
14. Should be a standard requirement for the service provider.
Regulatory compliance
Owner of the information asset
Background check
Retention of business records
15. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Gap analysis
Patch management
Tie security risks to key business objectives
Background checks of prospective employees
16. Someone who accesses a computer or network illegally
Exceptions to policy
Hacker
Increase business value and confidence
Centralization of information security management
17. A key indicator of performance measurement.
Asset classification
Strategic alignment of security with business objectives
Multinational organization
OBusiness case development
18. Occurs after the risk assessment process - it does not measure it.
Process of introducing changes to systems
Digital certificate
Use of security metrics
Increase business value and confidence
19. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Identify the vulnerable systems and apply compensating controls
Security code reviews for the entire software application
Risk appetite
Gain unauthorized access to applications
20. Program that hides within or looks like a legit program
Trojan horse
People
Threat assessment
Data mart
21. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Detection defenses
Security awareness training for all employees
The board of directors and senior management
Alignment with business strategy
22. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Service level agreements (SLAs)
Background check
Strategic alignment of security with business objectives
Developing an information security baseline
23. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Decentralization
Stress testing
Annual loss expectancy (ALE)calculations
Power surge/over voltage (spike)
24. Focuses on identifying vulnerabilities.
The data owner
Penetration testing
Consensus on risks and controls
Lack of change management
25. Occurs when the electrical supply drops
The board of directors and senior management
Single sign-on (SSO) product
Consensus on risks and controls
Undervoltage (brownout)
26. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Decentralization
Key risk indicator (KRI) setup
Role-based access control
Calculating the value of the information or asset
27. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Tie security risks to key business objectives
Digital certificate
Continuous monitoring control initiatives
Regulatory compliance
28. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Performing a risk assessment
Cracker
Deeper level of analysis
29. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Security baselines
Cross-site scripting attacks
Platform security - intrusion detection and antivirus controls
Exceptions to policy
30. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Equal error rate (EER)
Asset classification
Inherent risk
Phishing
31. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Multinational organization
Monitoring processes
Background checks of prospective employees
What happened and how the breach was resolved
32. Computer that has duplicate components so it can continue to operate when one of its main components fail
Properly aligned with business goals and objectives
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Fault-tolerant computer
Internal risk assessment
33. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Protective switch covers
Countermeasure cost-benefit analysis
The data custodian
Data isolation
35. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Its ability to reduce or eliminate business risks
Multinational organization
Security risk
Cost of control
36. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Properly aligned with business goals and objectives
Personal firewall
Tie security risks to key business objectives
Owner of the information asset
37. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
SWOT analysis
Security baselines
Performing a risk assessment
All personnel
38. Provides process needs but not impact.
The authentication process is broken
Resource dependency assessment
Lack of change management
Transferred risk
39. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Well-defined roles and responsibilities
Gap analysis
Vulnerability assessment
Protective switch covers
40. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
Key controls
include security responsibilities in a job description
Retention of business records
41. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Role-based policy
Continuous monitoring control initiatives
Continuous analysis - monitoring and feedback
Tailgating
42. Identification and _______________ of business risk enables project managers to address areas with most significance.
Prioritization
Proficiency testing
Consensus on risks and controls
Power surge/over voltage (spike)
43. Provides strong online authentication.
Spoofing attacks
Applying the proper classification to the data
Transmit e-mail messages
Public key infrastructure (PKI)
44. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Is willing to accept
Role-based policy
Aligned with organizational goals
Process of introducing changes to systems
45. Most effective for evaluating the degree to which information security objectives are being met.
Regular review of access control lists
The balanced scorecard
Information security manager
Resource dependency assessment
46. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
SWOT analysis
The awareness and agreement of the data subjects
Residual risk would be reduced by a greater amount
Identify the relevant systems and processes
47. All within the responsibility of the information security manager.
Security risk
Risk management and the requirements of the organization
Platform security - intrusion detection and antivirus controls
Penetration testing
48. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
Centralization of information security management
Encryption key management
Data warehouse
49. Should be performed to identify the risk and determine needed controls.
Overall organizational structure
The balanced scorecard
Internal risk assessment
Annual loss expectancy (ALE)calculations
50. A function of the session keys distributed by the PKI.
Confidentiality
Cracker
Exceptions to policy
Data classification