SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
Gap analysis
Comparison of cost of achievement
Developing an information security baseline
2. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Phishing
Equal error rate (EER)
Vulnerability assessment
Intrusion detection system (IDS)
3. The best measure for preventing the unauthorized disclosure of confidential information.
Cross-site scripting attacks
Risk management and the requirements of the organization
Protective switch covers
Acceptable use policies
4. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Methodology used in the assessment
Alignment with business strategy
Regulatory compliance
Impractical and is often cost-prohibitive
5. When the ________________ is more than the cost of the risk - the risk should be accepted.
Cost of control
Calculating the value of the information or asset
The data owner
Security awareness training for all employees
6. A method for analyzing and reducing a relational database to its most streamlined form
Cyber terrorist
Biometric access control systems
Normalization
Impractical and is often cost-prohibitive
7. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
Security baselines
Baseline standard and then develop additional standards
Use of security metrics
8. S small warehouse - designed for the end-user needs in a strategic business unit
Data mart
Countermeasure cost-benefit analysis
Performing a risk assessment
Annual loss expectancy (ALE)calculations
9. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Continuous analysis - monitoring and feedback
Control effectiveness
Security risk
include security responsibilities in a job description
10. Accesses a computer or network illegally
Identify the relevant systems and processes
Cracker
Proficiency testing
Trojan horse
11. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Reduce risk to an acceptable level
Transferred risk
What happened and how the breach was resolved
Performing a risk assessment
12. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
What happened and how the breach was resolved
Phishing
0-day vulnerabilities
13. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Security risk
Residual risk would be reduced by a greater amount
Impractical and is often cost-prohibitive
14. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Retention of business records
Undervoltage (brownout)
Nondisclosure agreement (NDA)
Certificate authority (CA)
15. Occurs when the electrical supply drops
Single sign-on (SSO) product
Owner of the information asset
Undervoltage (brownout)
Centralized structure
16. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
People
Public key infrastructure (PKI)
Well-defined roles and responsibilities
17. Oversees the overall classification management of the information.
Internal risk assessment
Trojan horse
Spoofing attacks
The information security officer
18. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Asset classification
Spoofing attacks
Gap analysis
A network vulnerability assessment
19. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Risk appetite
The board of directors and senior management
Power surge/over voltage (spike)
Access control matrix
20. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Skills inventory
Total cost of ownership (TCO)
The database administrator
Properly aligned with business goals and objectives
21. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
Security risk
Acceptable use policies
Residual risk would be reduced by a greater amount
22. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Annually or whenever there is a significant change
Comparison of cost of achievement
Cost of control
Cryptographic secure sockets layer (SSL) implementations and short key lengths
23. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
The data owner
Confidentiality
Power surge/over voltage (spike)
Increase business value and confidence
24. Utility program that detects and protects a personal computer from unauthorized intrusions
Identify the relevant systems and processes
Annual loss expectancy (ALE)calculations
Personal firewall
Properly aligned with business goals and objectives
25. A risk assessment should be conducted _________________.
Nondisclosure agreement (NDA)
Security awareness training for all employees
Annually or whenever there is a significant change
Transmit e-mail messages
26. Computer that has duplicate components so it can continue to operate when one of its main components fail
Protective switch covers
Data classification
Fault-tolerant computer
Role-based access control
27. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Alignment with business strategy
Platform security - intrusion detection and antivirus controls
Risk assessment - evaluation and impact analysis
Multinational organization
28. Focuses on identifying vulnerabilities.
Key controls
Encryption
Penetration testing
Requirements of the data owners
29. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Protective switch covers
Resource dependency assessment
Waterfall chart
Knowledge management
30. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Worm
Digital signatures
Get senior management onboard
31. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Certificate authority (CA)
The authentication process is broken
Get senior management onboard
Encryption of the hard disks
32. Used to understand the flow of one process into another.
Waterfall chart
Script kiddie
Encryption of the hard disks
Its ability to reduce or eliminate business risks
33. The MOST important element of an information security strategy.
Penetration testing
Defined objectives
The information security officer
Trojan horse
34. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Get senior management onboard
Cyber extortionist
A network vulnerability assessment
BIA (Business Impact Assessment
35. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Knowledge management
Total cost of ownership (TCO)
IP address packet filtering
Control effectiveness
36. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Security code reviews for the entire software application
Encryption key management
Virus detection
Total cost of ownership (TCO)
37. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Key risk indicator (KRI) setup
Methodology used in the assessment
Tailgating
Increase business value and confidence
38. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
Acceptable use policies
Alignment with business strategy
Process of introducing changes to systems
39. provides the most effective protection of data on mobile devices.
People
Examples of containment defenses
Impractical and is often cost-prohibitive
Encryption
40. Company or person you believe will not send a virus-infect file knowingly
Annually or whenever there is a significant change
Overall organizational structure
Trusted source
OBusiness case development
41. The PRIMARY goal in developing an information security strategy is to: _________________________.
Support the business objectives of the organization
IP address packet filtering
Cyber extortionist
Worm
42. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Baseline standard and then develop additional standards
Data owners
Monitoring processes
People
43. ecurity design flaws require a ____________________.
Detection defenses
SWOT analysis
Annual loss expectancy (ALE)calculations
Deeper level of analysis
44. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Defining high-level business security requirements
All personnel
Countermeasure cost-benefit analysis
Platform security - intrusion detection and antivirus controls
45. Useful but only with regard to specific technical skills.
Proficiency testing
Threat assessment
Biometric access control systems
Patch management process
46. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Hacker
Cyber extortionist
Phishing
Process of introducing changes to systems
47. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Hacker
Use of security metrics
Risk appetite
Reduce risk to an acceptable level
48. Involves the correction of software weaknesses and would necessarily follow change management procedures.
OBusiness case development
IP address packet filtering
Worm
Patch management
49. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Logon banners
Reduce risk to an acceptable level
The information security officer
Baseline standard and then develop additional standards
50. Would protect against spoofing an internal address but would not provide strong authentication.
MAL wear
Return on security investment (ROSI)
Decentralization
IP address packet filtering