SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Would protect against spoofing an internal address but would not provide strong authentication.
Background check
Power surge/over voltage (spike)
IP address packet filtering
People
2. Someone who accesses a computer or network illegally
Centralized structure
BIA (Business Impact Assessment
People
Hacker
3. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
OBusiness case development
Trusted source
Threat assessment
4. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Confidentiality
Its ability to reduce or eliminate business risks
Identify the relevant systems and processes
Trusted source
5. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Risk appetite
Data classification
Conduct a risk assessment
Residual risk
6. Only valid if assets have first been identified and appropriately valued.
Cracker
Access control matrix
The balanced scorecard
Annual loss expectancy (ALE)calculations
7. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Reduce risk to an acceptable level
BIA (Business Impact Assessment
Data mart
Exceptions to policy
8. A key indicator of performance measurement.
Skills inventory
The awareness and agreement of the data subjects
Security code reviews for the entire software application
Strategic alignment of security with business objectives
9. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Fault-tolerant computer
Resource dependency assessment
Key risk indicator (KRI) setup
Rule-based access control
10. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Control risk
Baseline standard and then develop additional standards
Owner of the information asset
Security code reviews for the entire software application
11. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Strategic alignment of security with business objectives
BIA (Business Impact Assessment
The database administrator
Asset classification
12. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Undervoltage (brownout)
Transmit e-mail messages
A network vulnerability assessment
13. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Baseline standard and then develop additional standards
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Encryption
Key controls
14. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Multinational organization
Vulnerability assessment
Personal firewall
Baseline standard and then develop additional standards
15. Applications cannot access data associated with other apps
Fault-tolerant computer
Methodology used in the assessment
Risk management and the requirements of the organization
Data isolation
16. Ensure that transmitted information can be attributed to the named sender.
Asset classification
Virus
Requirements of the data owners
Digital signatures
17. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Background checks of prospective employees
Identify the vulnerable systems and apply compensating controls
Two-factor authentication
Cyber terrorist
18. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Baseline standard and then develop additional standards
Identify the vulnerable systems and apply compensating controls
Key risk indicator (KRI) setup
Retention of business records
19. An information security manager has to impress upon the human resources department the need for _____________________.
Security awareness training for all employees
Alignment with business strategy
Worm
Waterfall chart
20. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Threat assessment
The board of directors and senior management
Do with the information it collects
Defining and ratifying the classification structure of information assets
21. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Aligned with organizational goals
Creation of a business continuity plan
Do with the information it collects
Malicious software and spyware
22. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Its ability to reduce or eliminate business risks
Alignment with business strategy
Negotiating a local version of the organization standards
Identify the relevant systems and processes
23. Provide metrics to which outsourcing firms can be held accountable.
The board of directors and senior management
Service level agreements (SLAs)
Exceptions to policy
Total cost of ownership (TCO)
24. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Compliance with the organization's information security requirements
SWOT analysis
Breakeven point of risk reduction and cost
Service level agreements (SLAs)
25. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
include security responsibilities in a job description
Total cost of ownership (TCO)
Control effectiveness
The balanced scorecard
26. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
Inherent risk
OBusiness case development
Process of introducing changes to systems
27. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Gap analysis
The information security officer
Centralization of information security management
Security risk
28. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Background checks of prospective employees
Information contained on the equipment
Developing an information security baseline
Key controls
29. Should be determined from the risk assessment results.
Do with the information it collects
Defined objectives
The data owner
Audit objectives
30. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Creation of a business continuity plan
Key risk indicator (KRI) setup
Developing an information security baseline
Spoofing attacks
31. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Increase business value and confidence
Background check
Defining high-level business security requirements
Risk appetite
32. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Annual loss expectancy (ALE)calculations
Performing a risk assessment
Digital signatures
Classification of assets needs
33. S small warehouse - designed for the end-user needs in a strategic business unit
Defined objectives
Data mart
Service level agreements (SLAs)
Encryption key management
34. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Cyber terrorist
Intrusion detection system (IDS)
Centralization of information security management
Protective switch covers
35. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Risk management and the requirements of the organization
Tailgating
Gain unauthorized access to applications
Lack of change management
36. When the ________________ is more than the cost of the risk - the risk should be accepted.
Consensus on risks and controls
Tie security risks to key business objectives
Cost of control
Security code reviews for the entire software application
37. Utility program that detects and protects a personal computer from unauthorized intrusions
Get senior management onboard
Personal firewall
Use of security metrics
Baseline standard and then develop additional standards
38. Oversees the overall classification management of the information.
Confidentiality
The information security officer
Owner of the information asset
IP address packet filtering
39. Occurs after the risk assessment process - it does not measure it.
Methodology used in the assessment
Use of security metrics
Centralized structure
The data owner
40. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Intrusion detection system (IDS)
Alignment with business strategy
Information security manager
Encryption of the hard disks
41. Used to understand the flow of one process into another.
Waterfall chart
Data mart
The database administrator
The awareness and agreement of the data subjects
42. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Single sign-on (SSO) product
Personal firewall
Risk assessment - evaluation and impact analysis
Trusted source
43. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Logon banners
Threat assessment
Impractical and is often cost-prohibitive
Nondisclosure agreement (NDA)
44. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Personal firewall
Cyber extortionist
Background check
Biometric access control systems
45. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Identify the relevant systems and processes
The balanced scorecard
Role-based policy
BIA (Business Impact Assessment
46. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Creation of a business continuity plan
Impractical and is often cost-prohibitive
The information security officer
Get senior management onboard
47. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Certificate authority (CA)
The data custodian
Lack of change management
Overall organizational structure
48. Whenever personal data are transferred across national boundaries; ________________________ are required.
Spoofing attacks
The awareness and agreement of the data subjects
Certificate authority (CA)
Encryption key management
49. Company or person you believe will not send a virus-infect file knowingly
Retention of business records
Exceptions to policy
All personnel
Trusted source
50. Without _____________________ - there cannot be accountability.
Performing a risk assessment
Data mart
Well-defined roles and responsibilities
Deeper level of analysis