SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The information security manager needs to prioritize the controls based on ________________________.
Decentralization
include security responsibilities in a job description
Risk management and the requirements of the organization
Identify the vulnerable systems and apply compensating controls
2. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Deeper level of analysis
Patch management
Audit objectives
Spoofing attacks
3. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Phishing
The information security officer
Certificate authority (CA)
Compliance with the organization's information security requirements
4. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Security code reviews for the entire software application
Patch management process
Return on security investment (ROSI)
Data owners
5. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Annual loss expectancy (ALE)calculations
Attributes and characteristics of the 'desired state'
What happened and how the breach was resolved
Examples of containment defenses
6. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Retention of business records
Multinational organization
SWOT analysis
Safeguards over keys
7. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Prioritization
Single sign-on (SSO) product
Biometric access control systems
Monitoring processes
8. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Reduce risk to an acceptable level
Skills inventory
The authentication process is broken
Negotiating a local version of the organization standards
9. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Penetration testing
Tie security risks to key business objectives
Background check
Skills inventory
10. ecurity design flaws require a ____________________.
Owner of the information asset
Penetration testing
Defining high-level business security requirements
Deeper level of analysis
11. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Monitoring processes
Notifications and opt-out provisions
Encryption key management
Strategic alignment of security with business objectives
12. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
MAL wear
Tailgating
Data mart
13. Provides strong online authentication.
Public key infrastructure (PKI)
Decentralization
Impractical and is often cost-prohibitive
Support the business objectives of the organization
14. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Key risk indicator (KRI) setup
Data classification
Normalization
The data custodian
15. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Nondisclosure agreement (NDA)
Biometric access control systems
Spoofing attacks
Get senior management onboard
16. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Its ability to reduce or eliminate business risks
Virus
Deeper level of analysis
Logon banners
17. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
OBusiness case development
Key controls
Control effectiveness
What happened and how the breach was resolved
18. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Public key infrastructure (PKI)
Spoofing attacks
include security responsibilities in a job description
Single sign-on (SSO) product
19. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Virus
All personnel
Information security manager
MAL wear
20. Program that hides within or looks like a legit program
Risk assessment - evaluation and impact analysis
Digital certificate
Trojan horse
Attributes and characteristics of the 'desired state'
21. Occurs when the incoming level
Trusted source
Compliance with the organization's information security requirements
Overall organizational structure
Power surge/over voltage (spike)
22. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Is willing to accept
Cracker
Impractical and is often cost-prohibitive
Regulatory compliance
23. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Patch management
Gap analysis
Breakeven point of risk reduction and cost
Spoofing attacks
24. Someone who accesses a computer or network illegally
Safeguards over keys
Breakeven point of risk reduction and cost
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Hacker
25. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Risk management and the requirements of the organization
Malicious software and spyware
Role-based access control
Risk assessment - evaluation and impact analysis
26. A function of the session keys distributed by the PKI.
Confidentiality
Its ability to reduce or eliminate business risks
Platform security - intrusion detection and antivirus controls
Knowledge management
27. BEST option to improve accountability for a system administrator is to _____________________.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
The authentication process is broken
Internal risk assessment
include security responsibilities in a job description
28. Someone who uses the internet or network to destroy or damage computers for political reasons
Exceptions to policy
Cyber terrorist
Gap analysis
Penetration testing
29. Only valid if assets have first been identified and appropriately valued.
The information security officer
Breakeven point of risk reduction and cost
Digital certificate
Annual loss expectancy (ALE)calculations
30. All within the responsibility of the information security manager.
Safeguards over keys
Baseline standard and then develop additional standards
Platform security - intrusion detection and antivirus controls
Compliance with the organization's information security requirements
31. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Regular review of access control lists
Negotiating a local version of the organization standards
Centralized structure
Defined objectives
32. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Countermeasure cost-benefit analysis
Control effectiveness
Undervoltage (brownout)
Reduce risk to an acceptable level
33. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Baseline standard and then develop additional standards
Consensus on risks and controls
Get senior management onboard
34. S small warehouse - designed for the end-user needs in a strategic business unit
Multinational organization
Cyber extortionist
Patch management process
Data mart
35. When defining the information classification policy - the ___________________ need to be identified.
Process of introducing changes to systems
Requirements of the data owners
Stress testing
Patch management process
36. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Decentralization
Skills inventory
Residual risk would be reduced by a greater amount
Is willing to accept
37. Needs to define the access rules - which is troublesome and error prone in large organizations.
Confidentiality
Rule-based access control
Conduct a risk assessment
Lack of change management
38. provides the most effective protection of data on mobile devices.
Inherent risk
Process of introducing changes to systems
The information security officer
Encryption
39. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Protective switch covers
BIA (Business Impact Assessment
Proficiency testing
Defined objectives
40. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Penetration testing
Tailgating
Is willing to accept
Strategic alignment of security with business objectives
41. To identify known vulnerabilities based on common misconfigurations and missing updates.
Detection defenses
A network vulnerability assessment
Requirements of the data owners
Impractical and is often cost-prohibitive
42. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Security baselines
Annually or whenever there is a significant change
Decentralization
What happened and how the breach was resolved
43. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Increase business value and confidence
Role-based access control
Data owners
Logon banners
44. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Residual risk
Cyber terrorist
The authentication process is broken
Key risk indicator (KRI) setup
45. Same intent as a cracker but does not have the technical skills and knowledge
Script kiddie
Compliance with the organization's information security requirements
Aligned with organizational goals
Get senior management onboard
46. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
The authentication process is broken
Script kiddie
Security baselines
OBusiness case development
47. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
A network vulnerability assessment
Penetration testing
The information security officer
Cyber extortionist
48. Used to understand the flow of one process into another.
Identify the relevant systems and processes
Waterfall chart
Breakeven point of risk reduction and cost
Continuous monitoring control initiatives
49. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Total cost of ownership (TCO)
Data classification
Identify the relevant systems and processes
Equal error rate (EER)
50. Occurs after the risk assessment process - it does not measure it.
Virus detection
Classification of assets needs
Use of security metrics
Acceptable use policies