SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Security awareness training for all employees
Assess the risks to the business operation
BIA (Business Impact Assessment
Security baselines
2. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
What happened and how the breach was resolved
Transferred risk
Gap analysis
Defining high-level business security requirements
3. New security ulnerabilities should be managed through a ________________.
Public key infrastructure (PKI)
Data classification
Regular review of access control lists
Patch management process
4. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
Regulatory compliance
Use of security metrics
Properly aligned with business goals and objectives
5. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Properly aligned with business goals and objectives
Confidentiality
0-day vulnerabilities
Equal error rate (EER)
6. BEST option to improve accountability for a system administrator is to _____________________.
Protective switch covers
Proficiency testing
Strategic alignment of security with business objectives
include security responsibilities in a job description
7. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Identify the relevant systems and processes
Tie security risks to key business objectives
Impractical and is often cost-prohibitive
Security baselines
8. Information security governance models are highly dependent on the _____________________.
Overall organizational structure
Malicious software and spyware
Single sign-on (SSO) product
Undervoltage (brownout)
9. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
Identify the vulnerable systems and apply compensating controls
Public key infrastructure (PKI)
Prioritization
10. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Audit objectives
The board of directors and senior management
Continuous analysis - monitoring and feedback
Support the business objectives of the organization
11. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
Spoofing attacks
Data mart
The information security officer
12. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Owner of the information asset
Defined objectives
Calculating the value of the information or asset
Process of introducing changes to systems
13. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Residual risk would be reduced by a greater amount
Strategic alignment of security with business objectives
Risk appetite
Gain unauthorized access to applications
14. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Intrusion detection system (IDS)
Continuous monitoring control initiatives
Background checks of prospective employees
Access control matrix
15. provides the most effective protection of data on mobile devices.
Encryption
Defining high-level business security requirements
include security responsibilities in a job description
Total cost of ownership (TCO)
16. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Aligned with organizational goals
Transmit e-mail messages
Cross-site scripting attacks
SWOT analysis
17. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Patch management process
Biometric access control systems
Annual loss expectancy (ALE)calculations
Defining and ratifying the classification structure of information assets
18. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Continuous monitoring control initiatives
Regulatory compliance
Developing an information security baseline
Normalization
19. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
20. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Protective switch covers
Detection defenses
The awareness and agreement of the data subjects
Public key infrastructure (PKI)
21. Oversees the overall classification management of the information.
Vulnerability assessment
Personal firewall
The information security officer
Security baselines
22. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Data owners
Regulatory compliance
Acceptable use policies
All personnel
23. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Data classification
Equal error rate (EER)
Patch management process
SWOT analysis
24. Useful but only with regard to specific technical skills.
Digital signatures
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Proficiency testing
Data mart
25. Uses security metrics to measure the performance of the information security program.
Risk assessment - evaluation and impact analysis
Trusted source
Conduct a risk assessment
Information security manager
26. Carries out the technical administration.
What happened and how the breach was resolved
Logon banners
Personal firewall
The database administrator
27. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Monitoring processes
The information security officer
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Trojan horse
28. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Patch management
Cost of control
The data owner
The information security officer
29. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
The data custodian
Digital signatures
Audit objectives
30. To identify known vulnerabilities based on common misconfigurations and missing updates.
Digital signatures
Rule-based access control
A network vulnerability assessment
Requirements of the data owners
31. Identification and _______________ of business risk enables project managers to address areas with most significance.
Protective switch covers
Prioritization
A network vulnerability assessment
Identify the relevant systems and processes
32. A method for analyzing and reducing a relational database to its most streamlined form
Defining high-level business security requirements
Control effectiveness
Worm
Normalization
33. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Conduct a risk assessment
The board of directors and senior management
Control effectiveness
Threat assessment
34. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
Centralization of information security management
Knowledge management
Annual loss expectancy (ALE)calculations
35. Awareness - training and physical security defenses.
Defining and ratifying the classification structure of information assets
Examples of containment defenses
BIA (Business Impact Assessment
Retention of business records
36. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Inherent risk
Exceptions to policy
Proficiency testing
The data owner
37. A repository of historical data organized by subject to support decision makers in the org
Notifications and opt-out provisions
All personnel
Data warehouse
Data classification
38. Culture has a significant impact on how information security will be implemented in a ______________________.
Key controls
Total cost of ownership (TCO)
Multinational organization
Public key infrastructure (PKI)
39. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Intrusion detection system (IDS)
Script kiddie
Threat assessment
Single sign-on (SSO) product
40. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Identify the relevant systems and processes
Compliance with the organization's information security requirements
Lack of change management
Notifications and opt-out provisions
41. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Identify the relevant systems and processes
Knowledge management
Resource dependency assessment
Increase business value and confidence
42. Someone who uses the internet or network to destroy or damage computers for political reasons
Access control matrix
Cyber terrorist
A network vulnerability assessment
Platform security - intrusion detection and antivirus controls
43. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Attributes and characteristics of the 'desired state'
Background check
Cyber terrorist
Certificate authority (CA)
44. When defining the information classification policy - the ___________________ need to be identified.
Power surge/over voltage (spike)
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Requirements of the data owners
The awareness and agreement of the data subjects
45. Inject malformed input.
Undervoltage (brownout)
Virus detection
Cross-site scripting attacks
Key risk indicator (KRI) setup
46. Accesses a computer or network illegally
Cracker
Developing an information security baseline
Knowledge management
0-day vulnerabilities
47. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Security code reviews for the entire software application
Control risk
Countermeasure cost-benefit analysis
Logon banners
48. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Regulatory compliance
Security risk
Identify the relevant systems and processes
49. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Hacker
Regulatory compliance
Alignment with business strategy
What happened and how the breach was resolved
50. Provides strong online authentication.
Total cost of ownership (TCO)
Overall organizational structure
Consensus on risks and controls
Public key infrastructure (PKI)