SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Key controls
Encryption of the hard disks
Deeper level of analysis
Regulatory compliance
2. A function of the session keys distributed by the PKI.
Confidentiality
Virus
Waterfall chart
Malicious software and spyware
3. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
The balanced scorecard
The data owner
Worm
Transmit e-mail messages
4. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
Rule-based access control
Key risk indicator (KRI) setup
Waterfall chart
5. Uses security metrics to measure the performance of the information security program.
Defining and ratifying the classification structure of information assets
Information security manager
Methodology used in the assessment
Alignment with business strategy
6. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Digital certificate
Identify the relevant systems and processes
Threat assessment
Malicious software and spyware
7. Accesses a computer or network illegally
Cracker
Identify the relevant systems and processes
Audit objectives
Nondisclosure agreement (NDA)
8. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Skills inventory
Public key infrastructure (PKI)
Logon banners
Its ability to reduce or eliminate business risks
9. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Undervoltage (brownout)
Classification of assets needs
Regular review of access control lists
Digital signatures
10. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Encryption of the hard disks
Hacker
Consensus on risks and controls
Nondisclosure agreement (NDA)
11. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Prioritization
Security awareness training for all employees
Risk assessment - evaluation and impact analysis
BIA (Business Impact Assessment
12. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Fault-tolerant computer
Residual risk
Gap analysis
Well-defined roles and responsibilities
13. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
Digital signatures
Alignment with business strategy
Patch management
14. Has full responsibility over data.
Penetration testing
People
Regulatory compliance
The data owner
15. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Confidentiality
Negotiating a local version of the organization standards
Information security manager
Normalization
16. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
0-day vulnerabilities
Residual risk would be reduced by a greater amount
Use of security metrics
Do with the information it collects
17. The data owner is responsible for _______________________.
Applying the proper classification to the data
Intrusion detection system (IDS)
Cost of control
Calculating the value of the information or asset
18. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Notifications and opt-out provisions
Detection defenses
The database administrator
Phishing
19. S small warehouse - designed for the end-user needs in a strategic business unit
Calculating the value of the information or asset
Classification of assets needs
Skills inventory
Data mart
20. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. Ensure that transmitted information can be attributed to the named sender.
Digital signatures
Gap analysis
Tailgating
Virus detection
22. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Defining and ratifying the classification structure of information assets
Tailgating
Role-based access control
Owner of the information asset
23. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Fault-tolerant computer
Risk assessment - evaluation and impact analysis
Role-based policy
Service level agreements (SLAs)
24. A notice that guarantees a user or a web site is legitimate
The board of directors and senior management
The data owner
Digital certificate
Gain unauthorized access to applications
25. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
Lack of change management
Support the business objectives of the organization
Key risk indicator (KRI) setup
26. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Prioritization
Knowledge management
Tailgating
Proficiency testing
27. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Personal firewall
Centralization of information security management
Virus detection
Cyber extortionist
28. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Background check
Security risk
Centralized structure
Increase business value and confidence
29. The primary role of the information security manager in the process of information classification within the organization.
Encryption key management
Defining and ratifying the classification structure of information assets
Asset classification
Requirements of the data owners
30. Inject malformed input.
Tailgating
Data warehouse
Virus detection
Cross-site scripting attacks
31. BEST option to improve accountability for a system administrator is to _____________________.
Risk assessment - evaluation and impact analysis
Its ability to reduce or eliminate business risks
Penetration testing
include security responsibilities in a job description
32. Used to understand the flow of one process into another.
Continuous monitoring control initiatives
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Annually or whenever there is a significant change
Waterfall chart
33. When defining the information classification policy - the ___________________ need to be identified.
Phishing
Protective switch covers
Requirements of the data owners
Hacker
34. Program that hides within or looks like a legit program
Normalization
Audit objectives
Trojan horse
Assess the risks to the business operation
35. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
SWOT analysis
Access control matrix
Aligned with organizational goals
Personal firewall
36. Someone who accesses a computer or network illegally
Threat assessment
Identify the relevant systems and processes
Logon banners
Hacker
37. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Comparison of cost of achievement
Data warehouse
Continuous analysis - monitoring and feedback
Decentralization
38. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Key controls
Transferred risk
What happened and how the breach was resolved
Threat assessment
39. Utility program that detects and protects a personal computer from unauthorized intrusions
Encryption key management
Personal firewall
Risk appetite
Defining high-level business security requirements
40. Information security governance models are highly dependent on the _____________________.
Fault-tolerant computer
Worm
Countermeasure cost-benefit analysis
Overall organizational structure
41. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Defining high-level business security requirements
Centralization of information security management
Process of introducing changes to systems
42. Whenever personal data are transferred across national boundaries; ________________________ are required.
The awareness and agreement of the data subjects
Security code reviews for the entire software application
Continuous monitoring control initiatives
Residual risk would be reduced by a greater amount
43. Provides process needs but not impact.
Spoofing attacks
Inherent risk
Resource dependency assessment
The awareness and agreement of the data subjects
44. Risk should be reduced to a level that an organization _____________.
Data owners
Is willing to accept
Compliance with the organization's information security requirements
Spoofing attacks
45. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Asset classification
Risk appetite
Deeper level of analysis
Nondisclosure agreement (NDA)
46. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Asset classification
Biometric access control systems
Defining and ratifying the classification structure of information assets
Risk assessment - evaluation and impact analysis
47. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Breakeven point of risk reduction and cost
Tie security risks to key business objectives
Data warehouse
Encryption key management
48. Has to be integrated into the requirements of every software application's design.
Negotiating a local version of the organization standards
Encryption key management
Background check
Lack of change management
49. A Successful risk management should lead to a ________________.
Security code reviews for the entire software application
Consensus on risks and controls
Breakeven point of risk reduction and cost
Attributes and characteristics of the 'desired state'
50. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Countermeasure cost-benefit analysis
Cyber extortionist
Calculating the value of the information or asset
The information security officer