SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Classification of assets needs
A network vulnerability assessment
BIA (Business Impact Assessment
Calculating the value of the information or asset
2. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Gain unauthorized access to applications
Centralization of information security management
Lack of change management
Breakeven point of risk reduction and cost
3. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Access control matrix
Virus detection
Prioritization
Fault-tolerant computer
4. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Cyber terrorist
SWOT analysis
Rule-based access control
Deeper level of analysis
5. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
Classification of assets needs
Safeguards over keys
A network vulnerability assessment
6. Without _____________________ - there cannot be accountability.
Encryption of the hard disks
Script kiddie
Control effectiveness
Well-defined roles and responsibilities
7. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Cross-site scripting attacks
Detection defenses
Decentralization
Comparison of cost of achievement
8. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Alignment with business strategy
Cyber terrorist
Methodology used in the assessment
Comparison of cost of achievement
9. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Data owners
Assess the risks to the business operation
OBusiness case development
Protective switch covers
10. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Calculating the value of the information or asset
Tailgating
Virus
Information security manager
11. Program that hides within or looks like a legit program
Examples of containment defenses
Total cost of ownership (TCO)
Residual risk
Trojan horse
12. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Increase business value and confidence
Total cost of ownership (TCO)
Risk assessment - evaluation and impact analysis
Digital certificate
13. S small warehouse - designed for the end-user needs in a strategic business unit
Data mart
Digital signatures
Risk assessment - evaluation and impact analysis
Prioritization
14. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Transferred risk
Public key infrastructure (PKI)
Exceptions to policy
Use of security metrics
15. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Security baselines
Phishing
Script kiddie
Tie security risks to key business objectives
16. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Compliance with the organization's information security requirements
Penetration testing
Skills inventory
Information contained on the equipment
17. Should be performed to identify the risk and determine needed controls.
Background checks of prospective employees
Internal risk assessment
Prioritization
Overall organizational structure
18. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Script kiddie
Encryption
Transferred risk
19. Primarily reduce risk and are most effective for the protection of information assets.
Internal risk assessment
Key controls
Multinational organization
The balanced scorecard
20. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Lack of change management
Process of introducing changes to systems
Cyber terrorist
Developing an information security baseline
21. BEST option to improve accountability for a system administrator is to _____________________.
Annually or whenever there is a significant change
include security responsibilities in a job description
Security code reviews for the entire software application
Centralized structure
22. Involves the correction of software weaknesses and would necessarily follow change management procedures.
SWOT analysis
Patch management
Virus
Internal risk assessment
23. Someone who accesses a computer or network illegally
Hacker
Methodology used in the assessment
All personnel
Is willing to accept
24. An information security manager has to impress upon the human resources department the need for _____________________.
Security awareness training for all employees
Consensus on risks and controls
Support the business objectives of the organization
Spoofing attacks
25. It is easier to manage and control a _________________.
Centralized structure
Digital certificate
Resource dependency assessment
The authentication process is broken
26. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Regular review of access control lists
Properly aligned with business goals and objectives
Patch management process
Background check
27. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Detection defenses
Nondisclosure agreement (NDA)
Consensus on risks and controls
Conduct a risk assessment
28. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Cracker
The awareness and agreement of the data subjects
Regular review of access control lists
Prioritization
29. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Data warehouse
Confidentiality
Security awareness training for all employees
Access control matrix
30. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Cyber terrorist
Key controls
Tailgating
Nondisclosure agreement (NDA)
31. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
SWOT analysis
Skills inventory
Defining high-level business security requirements
Properly aligned with business goals and objectives
32. Accesses a computer or network illegally
Virus detection
Power surge/over voltage (spike)
Cracker
The awareness and agreement of the data subjects
33. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Transferred risk
Data classification
Well-defined roles and responsibilities
Acceptable use policies
34. A function of the session keys distributed by the PKI.
Well-defined roles and responsibilities
Data owners
Safeguards over keys
Confidentiality
35. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
Patch management process
Support the business objectives of the organization
Resource dependency assessment
36. Should be a standard requirement for the service provider.
Risk appetite
Background check
Regular review of access control lists
Applying the proper classification to the data
37. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Risk management and the requirements of the organization
Reduce risk to an acceptable level
Knowledge management
Protective switch covers
38. The data owner is responsible for _______________________.
Security awareness training for all employees
Penetration testing
Applying the proper classification to the data
Defining and ratifying the classification structure of information assets
39. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
What happened and how the breach was resolved
Deeper level of analysis
0-day vulnerabilities
Malicious software and spyware
40. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Encryption key management
Residual risk
Defining high-level business security requirements
Threat assessment
41. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Classification of assets needs
Internal risk assessment
Risk appetite
Do with the information it collects
42. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
Background check
Reduce risk to an acceptable level
Alignment with business strategy
43. Useful but only with regard to specific technical skills.
Its ability to reduce or eliminate business risks
Centralized structure
Negotiating a local version of the organization standards
Proficiency testing
44. Used to understand the flow of one process into another.
Intrusion detection system (IDS)
Aligned with organizational goals
Background check
Waterfall chart
45. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Data mart
Undervoltage (brownout)
Classification of assets needs
Vulnerability assessment
46. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Continuous monitoring control initiatives
Penetration testing
Gap analysis
Baseline standard and then develop additional standards
47. Ensure that transmitted information can be attributed to the named sender.
Digital signatures
Biometric access control systems
Logon banners
Resource dependency assessment
48. Occurs when the incoming level
Stress testing
Power surge/over voltage (spike)
include security responsibilities in a job description
Data warehouse
49. Provides strong online authentication.
0-day vulnerabilities
Proficiency testing
Defining high-level business security requirements
Public key infrastructure (PKI)
50. Carries out the technical administration.
Spoofing attacks
Attributes and characteristics of the 'desired state'
Penetration testing
The database administrator