SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Proficiency testing
Tie security risks to key business objectives
Data classification
Safeguards over keys
2. To identify known vulnerabilities based on common misconfigurations and missing updates.
Safeguards over keys
Increase business value and confidence
Intrusion detection system (IDS)
A network vulnerability assessment
3. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Resource dependency assessment
Virus
Security code reviews for the entire software application
Trusted source
4. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Calculating the value of the information or asset
Return on security investment (ROSI)
Continuous monitoring control initiatives
Breakeven point of risk reduction and cost
5. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Information security manager
Developing an information security baseline
Get senior management onboard
What happened and how the breach was resolved
6. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Continuous monitoring control initiatives
Data isolation
Applying the proper classification to the data
Access control matrix
7. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Vulnerability assessment
Protective switch covers
Annually or whenever there is a significant change
Centralization of information security management
8. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Prioritization
Proficiency testing
People
Patch management process
9. The data owner is responsible for _______________________.
Exceptions to policy
Trusted source
Classification of assets needs
Applying the proper classification to the data
10. Same intent as a cracker but does not have the technical skills and knowledge
Platform security - intrusion detection and antivirus controls
Cyber extortionist
Script kiddie
Annual loss expectancy (ALE)calculations
11. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Creation of a business continuity plan
Cost of control
Gain unauthorized access to applications
Proficiency testing
12. provides the most effective protection of data on mobile devices.
Encryption
Two-factor authentication
Countermeasure cost-benefit analysis
Asset classification
13. Occurs when the electrical supply drops
Undervoltage (brownout)
The authentication process is broken
Key controls
Strategic alignment of security with business objectives
14. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Equal error rate (EER)
0-day vulnerabilities
Examples of containment defenses
The data custodian
15. Company or person you believe will not send a virus-infect file knowingly
Role-based policy
What happened and how the breach was resolved
Single sign-on (SSO) product
Trusted source
16. Has to be integrated into the requirements of every software application's design.
Platform security - intrusion detection and antivirus controls
Single sign-on (SSO) product
Encryption key management
Negotiating a local version of the organization standards
17. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Notifications and opt-out provisions
Patch management
Tailgating
The database administrator
18. Utility program that detects and protects a personal computer from unauthorized intrusions
Vulnerability assessment
Security risk
Defining and ratifying the classification structure of information assets
Personal firewall
19. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Classification of assets needs
Data classification
Overall organizational structure
Defining high-level business security requirements
20. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
IP address packet filtering
The information security officer
Data classification
Data owners
21. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
A network vulnerability assessment
Negotiating a local version of the organization standards
The awareness and agreement of the data subjects
22. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Virus detection
All personnel
Security risk
Security baselines
23. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
Security awareness training for all employees
Logon banners
Cryptographic secure sockets layer (SSL) implementations and short key lengths
24. Needs to define the access rules - which is troublesome and error prone in large organizations.
Personal firewall
The board of directors and senior management
Rule-based access control
Undervoltage (brownout)
25. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Consensus on risks and controls
Internal risk assessment
Data isolation
Logon banners
26. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Threat assessment
Increase business value and confidence
Process of introducing changes to systems
All personnel
27. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Knowledge management
Protective switch covers
Risk appetite
Proficiency testing
28. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Normalization
Digital certificate
Annually or whenever there is a significant change
Certificate authority (CA)
29. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Skills inventory
Assess the risks to the business operation
Knowledge management
Annual loss expectancy (ALE)calculations
30. Provides process needs but not impact.
Resource dependency assessment
Knowledge management
Spoofing attacks
Lack of change management
31. A Successful risk management should lead to a ________________.
BIA (Business Impact Assessment
Security baselines
Breakeven point of risk reduction and cost
The awareness and agreement of the data subjects
32. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Breakeven point of risk reduction and cost
Encryption of the hard disks
Skills inventory
Information security manager
33. Someone who uses the internet or network to destroy or damage computers for political reasons
Cyber terrorist
Data classification
Security risk
Alignment with business strategy
34. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
Risk management and the requirements of the organization
Comparison of cost of achievement
Digital certificate
35. Primarily reduce risk and are most effective for the protection of information assets.
Lack of change management
Transferred risk
Key controls
IP address packet filtering
36. Would protect against spoofing an internal address but would not provide strong authentication.
People
Transmit e-mail messages
IP address packet filtering
Attributes and characteristics of the 'desired state'
37. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Undervoltage (brownout)
Risk assessment - evaluation and impact analysis
Performing a risk assessment
Continuous analysis - monitoring and feedback
38. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Annual loss expectancy (ALE)calculations
Attributes and characteristics of the 'desired state'
Equal error rate (EER)
Process of introducing changes to systems
39. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Background checks of prospective employees
Exceptions to policy
Threat assessment
Information security manager
40. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Is willing to accept
The database administrator
Control effectiveness
Assess the risks to the business operation
41. It is more efficient to establish a ___________________for locations that must meet specific requirements.
A network vulnerability assessment
Regular review of access control lists
Baseline standard and then develop additional standards
Digital signatures
42. Should be performed to identify the risk and determine needed controls.
Calculating the value of the information or asset
Rule-based access control
Internal risk assessment
Properly aligned with business goals and objectives
43. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Residual risk
Centralization of information security management
Developing an information security baseline
Get senior management onboard
44. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Lack of change management
Countermeasure cost-benefit analysis
Control risk
Gain unauthorized access to applications
45. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
Conduct a risk assessment
Normalization
Multinational organization
46. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Digital certificate
Hacker
Worm
Do with the information it collects
47. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Audit objectives
Regulatory compliance
Role-based policy
Get senior management onboard
48. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
Penetration testing
Reduce risk to an acceptable level
Undervoltage (brownout)
49. Provides strong online authentication.
Public key infrastructure (PKI)
Impractical and is often cost-prohibitive
Creation of a business continuity plan
People
50. Programs that act without a user's knowledge and deliberately alter a computer's operations
MAL wear
People
Control effectiveness
Classification of assets needs
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests