SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The MOST important element of an information security strategy.
Personal firewall
Defined objectives
Background check
Return on security investment (ROSI)
2. A method for analyzing and reducing a relational database to its most streamlined form
Normalization
Performing a risk assessment
Vulnerability assessment
Rule-based access control
3. The information security manager needs to prioritize the controls based on ________________________.
Identify the relevant systems and processes
Monitoring processes
People
Risk management and the requirements of the organization
4. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
The data custodian
Phishing
Defining high-level business security requirements
include security responsibilities in a job description
5. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Regulatory compliance
Confidentiality
Regular review of access control lists
Total cost of ownership (TCO)
6. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Exceptions to policy
Regulatory compliance
Data warehouse
Creation of a business continuity plan
7. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Vulnerability assessment
Tie security risks to key business objectives
Information contained on the equipment
Negotiating a local version of the organization standards
8. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Methodology used in the assessment
Do with the information it collects
Developing an information security baseline
Total cost of ownership (TCO)
9. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Annually or whenever there is a significant change
Encryption of the hard disks
Risk appetite
Key controls
10. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Service level agreements (SLAs)
The balanced scorecard
Detection defenses
Residual risk
11. A risk assessment should be conducted _________________.
Platform security - intrusion detection and antivirus controls
Data classification
Annually or whenever there is a significant change
Conduct a risk assessment
12. Program that hides within or looks like a legit program
Return on security investment (ROSI)
Trojan horse
The awareness and agreement of the data subjects
Skills inventory
13. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Security awareness training for all employees
Residual risk would be reduced by a greater amount
Gain unauthorized access to applications
Regulatory compliance
14. It is easier to manage and control a _________________.
Centralized structure
Consensus on risks and controls
Normalization
Compliance with the organization's information security requirements
15. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Risk assessment - evaluation and impact analysis
Do with the information it collects
The data owner
0-day vulnerabilities
16. Occurs after the risk assessment process - it does not measure it.
Identify the vulnerable systems and apply compensating controls
BIA (Business Impact Assessment
Use of security metrics
Personal firewall
17. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Data owners
Fault-tolerant computer
Encryption
Defined objectives
18. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
include security responsibilities in a job description
Reduce risk to an acceptable level
Intrusion detection system (IDS)
19. The most important characteristic of good security policies is that they be ____________________.
Aligned with organizational goals
Monitoring processes
Power surge/over voltage (spike)
Key risk indicator (KRI) setup
20. ecurity design flaws require a ____________________.
Script kiddie
Resource dependency assessment
Deeper level of analysis
Centralization of information security management
21. The PRIMARY goal in developing an information security strategy is to: _________________________.
Cyber terrorist
Worm
Safeguards over keys
Support the business objectives of the organization
22. Responsible for securing the information.
Confidentiality
The data custodian
Tailgating
Requirements of the data owners
23. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Reduce risk to an acceptable level
SWOT analysis
Protective switch covers
Confidentiality
24. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Cost of control
Threat assessment
Risk assessment - evaluation and impact analysis
Alignment with business strategy
25. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
Total cost of ownership (TCO)
Negotiating a local version of the organization standards
Single sign-on (SSO) product
26. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Baseline standard and then develop additional standards
Risk assessment - evaluation and impact analysis
Return on security investment (ROSI)
Breakeven point of risk reduction and cost
27. Ensures that there are no scalability problems.
Stress testing
Lack of change management
Protective switch covers
Logon banners
28. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Gain unauthorized access to applications
Confidentiality
Virus detection
Hacker
29. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Equal error rate (EER)
Key risk indicator (KRI) setup
Annual loss expectancy (ALE)calculations
Comparison of cost of achievement
30. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Data warehouse
Key controls
Security risk
Impractical and is often cost-prohibitive
31. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Cross-site scripting attacks
Skills inventory
Get senior management onboard
Decentralization
32. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Single sign-on (SSO) product
Nondisclosure agreement (NDA)
Do with the information it collects
Background checks of prospective employees
33. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Notifications and opt-out provisions
Internal risk assessment
Risk appetite
What happened and how the breach was resolved
34. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Regular review of access control lists
Internal risk assessment
Resource dependency assessment
Risk appetite
35. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
The data owner
BIA (Business Impact Assessment
include security responsibilities in a job description
Continuous monitoring control initiatives
36. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Defining and ratifying the classification structure of information assets
Transmit e-mail messages
Key risk indicator (KRI) setup
Cryptographic secure sockets layer (SSL) implementations and short key lengths
37. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
The board of directors and senior management
Creation of a business continuity plan
Safeguards over keys
Properly aligned with business goals and objectives
38. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Defining high-level business security requirements
Control risk
Protective switch covers
Confidentiality
39. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
The data owner
Its ability to reduce or eliminate business risks
Information security manager
Identify the relevant systems and processes
40. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Cost of control
Threat assessment
Resource dependency assessment
Encryption of the hard disks
41. Inject malformed input.
Return on security investment (ROSI)
0-day vulnerabilities
Identify the vulnerable systems and apply compensating controls
Cross-site scripting attacks
42. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Acceptable use policies
Consensus on risks and controls
Nondisclosure agreement (NDA)
Waterfall chart
43. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Public key infrastructure (PKI)
Negotiating a local version of the organization standards
Data isolation
44. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Identify the vulnerable systems and apply compensating controls
Control effectiveness
Encryption key management
Role-based policy
45. Reducing risk to a level too small to measure is _______________.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Script kiddie
Impractical and is often cost-prohibitive
Key risk indicator (KRI) setup
46. Cannot be minimized
Data warehouse
Inherent risk
Annual loss expectancy (ALE)calculations
Regulatory compliance
47. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Regulatory compliance
Centralization of information security management
Trusted source
Tie security risks to key business objectives
48. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Compliance with the organization's information security requirements
Trojan horse
Requirements of the data owners
Owner of the information asset
49. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Attributes and characteristics of the 'desired state'
Role-based access control
Data classification
Certificate authority (CA)
50. Uses security metrics to measure the performance of the information security program.
Residual risk
The board of directors and senior management
Control effectiveness
Information security manager