SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Utility program that detects and protects a personal computer from unauthorized intrusions
The information security officer
Biometric access control systems
Personal firewall
Continuous monitoring control initiatives
2. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Spoofing attacks
Undervoltage (brownout)
Virus detection
Regular review of access control lists
3. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Malicious software and spyware
Stress testing
Applying the proper classification to the data
4. Someone who uses the internet or network to destroy or damage computers for political reasons
Tailgating
Cost of control
Role-based access control
Cyber terrorist
5. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Decentralization
Strategic alignment of security with business objectives
Worm
Cross-site scripting attacks
6. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Centralized structure
Classification of assets needs
Trusted source
Hacker
7. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Key controls
Control effectiveness
People
Reduce risk to an acceptable level
8. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Countermeasure cost-benefit analysis
Role-based policy
Two-factor authentication
Increase business value and confidence
9. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
The board of directors and senior management
Requirements of the data owners
Cyber terrorist
Centralized structure
10. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
SWOT analysis
Applying the proper classification to the data
The data owner
11. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Increase business value and confidence
Risk appetite
Transmit e-mail messages
12. Computer that has duplicate components so it can continue to operate when one of its main components fail
Worm
Role-based access control
Fault-tolerant computer
A network vulnerability assessment
13. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
The data owner
Encryption of the hard disks
include security responsibilities in a job description
Negotiating a local version of the organization standards
14. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Certificate authority (CA)
Data isolation
Regulatory compliance
Patch management process
15. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Data owners
Information contained on the equipment
Spoofing attacks
Confidentiality
16. Occurs when the incoming level
Power surge/over voltage (spike)
Control effectiveness
Residual risk
Annually or whenever there is a significant change
17. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Stress testing
Information contained on the equipment
Biometric access control systems
The database administrator
18. New security ulnerabilities should be managed through a ________________.
A network vulnerability assessment
Patch management process
Waterfall chart
Impractical and is often cost-prohibitive
19. Accesses a computer or network illegally
Virus detection
Cracker
Conduct a risk assessment
Creation of a business continuity plan
20. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Control risk
Increase business value and confidence
Logon banners
Cost of control
21. Company or person you believe will not send a virus-infect file knowingly
Confidentiality
Trusted source
Equal error rate (EER)
Public key infrastructure (PKI)
22. Should be performed to identify the risk and determine needed controls.
OBusiness case development
Internal risk assessment
Virus
Information security manager
23. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Its ability to reduce or eliminate business risks
Annually or whenever there is a significant change
Phishing
Role-based policy
24. An information security manager has to impress upon the human resources department the need for _____________________.
Security awareness training for all employees
Consensus on risks and controls
Defined objectives
Continuous monitoring control initiatives
25. Normally addressed through antivirus and antispyware policies.
Countermeasure cost-benefit analysis
Malicious software and spyware
Get senior management onboard
0-day vulnerabilities
26. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Personal firewall
Creation of a business continuity plan
Consensus on risks and controls
Safeguards over keys
27. Uses security metrics to measure the performance of the information security program.
Information security manager
Data mart
SWOT analysis
BIA (Business Impact Assessment
28. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Performing a risk assessment
What happened and how the breach was resolved
OBusiness case development
Identify the vulnerable systems and apply compensating controls
29. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Exceptions to policy
Knowledge management
Tie security risks to key business objectives
Stress testing
30. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Inherent risk
Its ability to reduce or eliminate business risks
Residual risk would be reduced by a greater amount
Decentralization
31. Ensure that transmitted information can be attributed to the named sender.
Transmit e-mail messages
Personal firewall
Digital signatures
Notifications and opt-out provisions
32. To identify known vulnerabilities based on common misconfigurations and missing updates.
A network vulnerability assessment
Encryption
Well-defined roles and responsibilities
Total cost of ownership (TCO)
33. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Single sign-on (SSO) product
Get senior management onboard
Data warehouse
IP address packet filtering
34. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Provide metrics to which outsourcing firms can be held accountable.
Cost of control
Service level agreements (SLAs)
Inherent risk
Identify the relevant systems and processes
36. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Increase business value and confidence
Acceptable use policies
Residual risk
Detection defenses
37. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Alignment with business strategy
Residual risk
Breakeven point of risk reduction and cost
Attributes and characteristics of the 'desired state'
38. provides the most effective protection of data on mobile devices.
Key controls
Consensus on risks and controls
Encryption
Single sign-on (SSO) product
39. Most effective for evaluating the degree to which information security objectives are being met.
Well-defined roles and responsibilities
Continuous analysis - monitoring and feedback
Proficiency testing
The balanced scorecard
40. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Rule-based access control
Centralized structure
Background checks of prospective employees
Single sign-on (SSO) product
41. Provides strong online authentication.
IP address packet filtering
Phishing
Public key infrastructure (PKI)
Rule-based access control
42. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Performing a risk assessment
Public key infrastructure (PKI)
The database administrator
Service level agreements (SLAs)
43. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Is willing to accept
Data isolation
Regular review of access control lists
Defined objectives
44. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Baseline standard and then develop additional standards
Knowledge management
The information security officer
Transmit e-mail messages
45. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
The information security officer
Vulnerability assessment
Resource dependency assessment
Lack of change management
46. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Annually or whenever there is a significant change
Virus detection
Developing an information security baseline
Encryption of the hard disks
47. The most important characteristic of good security policies is that they be ____________________.
Defining and ratifying the classification structure of information assets
Certificate authority (CA)
Aligned with organizational goals
Get senior management onboard
48. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
People
What happened and how the breach was resolved
Identify the relevant systems and processes
Exceptions to policy
49. The best measure for preventing the unauthorized disclosure of confidential information.
Is willing to accept
Acceptable use policies
Use of security metrics
Applying the proper classification to the data
50. It is easier to manage and control a _________________.
Risk management and the requirements of the organization
Asset classification
Encryption
Centralized structure