SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Virus detection
Calculating the value of the information or asset
Encryption of the hard disks
Lack of change management
2. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Defining high-level business security requirements
Gain unauthorized access to applications
Virus detection
Data isolation
3. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
The awareness and agreement of the data subjects
Attributes and characteristics of the 'desired state'
Lack of change management
4. A method for analyzing and reducing a relational database to its most streamlined form
Multinational organization
Normalization
The data custodian
Consensus on risks and controls
5. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Strategic alignment of security with business objectives
Knowledge management
OBusiness case development
Data owners
6. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Risk appetite
Proficiency testing
Assess the risks to the business operation
Control effectiveness
7. Occurs when the electrical supply drops
The board of directors and senior management
Increase business value and confidence
Risk management and the requirements of the organization
Undervoltage (brownout)
8. Information security governance models are highly dependent on the _____________________.
Overall organizational structure
Performing a risk assessment
Developing an information security baseline
Countermeasure cost-benefit analysis
9. Most effective for evaluating the degree to which information security objectives are being met.
The balanced scorecard
Tie security risks to key business objectives
Patch management
Strategic alignment of security with business objectives
10. Identification and _______________ of business risk enables project managers to address areas with most significance.
Platform security - intrusion detection and antivirus controls
Transferred risk
Prioritization
Aligned with organizational goals
11. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Skills inventory
The data owner
Two-factor authentication
Gap analysis
13. A key indicator of performance measurement.
Rule-based access control
Properly aligned with business goals and objectives
Strategic alignment of security with business objectives
Hacker
14. provides the most effective protection of data on mobile devices.
Transferred risk
Continuous monitoring control initiatives
Waterfall chart
Encryption
15. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
People
Vulnerability assessment
Comparison of cost of achievement
What happened and how the breach was resolved
16. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Two-factor authentication
Attributes and characteristics of the 'desired state'
Notifications and opt-out provisions
Vulnerability assessment
17. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Countermeasure cost-benefit analysis
Access control matrix
People
Get senior management onboard
18. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
0-day vulnerabilities
Negotiating a local version of the organization standards
Consensus on risks and controls
Information security manager
19. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Risk appetite
Examples of containment defenses
Personal firewall
Methodology used in the assessment
20. Applications cannot access data associated with other apps
Rule-based access control
Data isolation
Do with the information it collects
Data warehouse
21. Without _____________________ - there cannot be accountability.
Cracker
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Cross-site scripting attacks
Well-defined roles and responsibilities
22. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Key controls
Monitoring processes
Threat assessment
Is willing to accept
23. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Stress testing
Control effectiveness
Virus
Annually or whenever there is a significant change
24. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
SWOT analysis
Residual risk
Process of introducing changes to systems
Safeguards over keys
25. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
The authentication process is broken
Increase business value and confidence
The board of directors and senior management
Attributes and characteristics of the 'desired state'
26. Provides process needs but not impact.
Single sign-on (SSO) product
Resource dependency assessment
Regular review of access control lists
Encryption of the hard disks
27. Responsible for securing the information.
Virus
Multinational organization
The data custodian
Spoofing attacks
28. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Examples of containment defenses
Reduce risk to an acceptable level
Defined objectives
29. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Is willing to accept
Regulatory compliance
Trojan horse
Total cost of ownership (TCO)
30. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Proficiency testing
The data owner
Detection defenses
What happened and how the breach was resolved
31. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Two-factor authentication
Attributes and characteristics of the 'desired state'
Background checks of prospective employees
What happened and how the breach was resolved
32. Occurs after the risk assessment process - it does not measure it.
Use of security metrics
Exceptions to policy
Cost of control
Alignment with business strategy
33. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
Return on security investment (ROSI)
Gain unauthorized access to applications
Security code reviews for the entire software application
34. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
BIA (Business Impact Assessment
Gain unauthorized access to applications
Background checks of prospective employees
35. Utility program that detects and protects a personal computer from unauthorized intrusions
Personal firewall
Background check
Use of security metrics
Risk appetite
36. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Role-based access control
Encryption
Cyber extortionist
Patch management
37. By definition are not previously known and therefore are undetectable.
Centralization of information security management
0-day vulnerabilities
IP address packet filtering
The board of directors and senior management
38. Used to understand the flow of one process into another.
Waterfall chart
Control effectiveness
Hacker
Calculating the value of the information or asset
39. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Fault-tolerant computer
Identify the relevant systems and processes
OBusiness case development
Strategic alignment of security with business objectives
40. Should PRIMARILY be based on regulatory and legal requirements.
Deeper level of analysis
Retention of business records
Consensus on risks and controls
Creation of a business continuity plan
41. A Successful risk management should lead to a ________________.
BIA (Business Impact Assessment
SWOT analysis
Breakeven point of risk reduction and cost
Use of security metrics
42. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Certificate authority (CA)
Strategic alignment of security with business objectives
Deeper level of analysis
Script kiddie
43. To identify known vulnerabilities based on common misconfigurations and missing updates.
Patch management process
Decentralization
Personal firewall
A network vulnerability assessment
44. Needs to define the access rules - which is troublesome and error prone in large organizations.
Rule-based access control
Information contained on the equipment
Equal error rate (EER)
Requirements of the data owners
45. Company or person you believe will not send a virus-infect file knowingly
Do with the information it collects
Applying the proper classification to the data
Trusted source
Centralization of information security management
46. New security ulnerabilities should be managed through a ________________.
Conduct a risk assessment
Rule-based access control
Patch management process
Deeper level of analysis
47. Program that hides within or looks like a legit program
Encryption
The authentication process is broken
Trojan horse
Gain unauthorized access to applications
48. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Retention of business records
Single sign-on (SSO) product
Control effectiveness
Data owners
49. Would protect against spoofing an internal address but would not provide strong authentication.
Biometric access control systems
IP address packet filtering
Worm
Methodology used in the assessment
50. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Cyber terrorist
Protective switch covers
Risk appetite
Centralized structure
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests