SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Should be a standard requirement for the service provider.
Background check
All personnel
Lack of change management
Threat assessment
2. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Monitoring processes
Risk appetite
Total cost of ownership (TCO)
Examples of containment defenses
3. Would protect against spoofing an internal address but would not provide strong authentication.
Continuous monitoring control initiatives
Acceptable use policies
IP address packet filtering
Hacker
4. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Phishing
Risk appetite
Do with the information it collects
Centralized structure
5. Computer that has duplicate components so it can continue to operate when one of its main components fail
Digital certificate
Penetration testing
Encryption of the hard disks
Fault-tolerant computer
6. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Tie security risks to key business objectives
IP address packet filtering
Public key infrastructure (PKI)
All personnel
7. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Data mart
The authentication process is broken
Annual loss expectancy (ALE)calculations
8. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Confidentiality
Malicious software and spyware
Security risk
Return on security investment (ROSI)
10. A method for analyzing and reducing a relational database to its most streamlined form
Tie security risks to key business objectives
Normalization
Well-defined roles and responsibilities
Vulnerability assessment
11. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Cracker
Calculating the value of the information or asset
Cross-site scripting attacks
Skills inventory
12. Risk should be reduced to a level that an organization _____________.
Security risk
Key controls
Is willing to accept
Transmit e-mail messages
13. Ensure that transmitted information can be attributed to the named sender.
Digital signatures
Continuous analysis - monitoring and feedback
Return on security investment (ROSI)
Key controls
14. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Alignment with business strategy
Digital signatures
Residual risk
Cyber extortionist
15. Programs that act without a user's knowledge and deliberately alter a computer's operations
MAL wear
Creation of a business continuity plan
Internal risk assessment
Centralized structure
16. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
The board of directors and senior management
Exceptions to policy
Safeguards over keys
Resource dependency assessment
17. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Tie security risks to key business objectives
Defining and ratifying the classification structure of information assets
Resource dependency assessment
Its ability to reduce or eliminate business risks
18. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Process of introducing changes to systems
Virus detection
MAL wear
Nondisclosure agreement (NDA)
19. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Notifications and opt-out provisions
Transferred risk
Key controls
Logon banners
20. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Alignment with business strategy
Properly aligned with business goals and objectives
Proficiency testing
Power surge/over voltage (spike)
21. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Public key infrastructure (PKI)
The data owner
Information contained on the equipment
Background checks of prospective employees
22. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Key risk indicator (KRI) setup
Nondisclosure agreement (NDA)
Background check
Overall organizational structure
23. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Centralized structure
Countermeasure cost-benefit analysis
Certificate authority (CA)
Lack of change management
24. The best measure for preventing the unauthorized disclosure of confidential information.
Data warehouse
Logon banners
Acceptable use policies
Security risk
25. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Data isolation
Get senior management onboard
Digital certificate
Equal error rate (EER)
26. Utility program that detects and protects a personal computer from unauthorized intrusions
Personal firewall
Cost of control
Centralized structure
0-day vulnerabilities
27. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
What happened and how the breach was resolved
The information security officer
Resource dependency assessment
MAL wear
28. BEST option to improve accountability for a system administrator is to _____________________.
Risk appetite
Safeguards over keys
Is willing to accept
include security responsibilities in a job description
29. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Comparison of cost of achievement
Transmit e-mail messages
Protective switch covers
Security awareness training for all employees
30. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Methodology used in the assessment
The data owner
Penetration testing
BIA (Business Impact Assessment
31. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
SWOT analysis
Transmit e-mail messages
Calculating the value of the information or asset
Return on security investment (ROSI)
32. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
Properly aligned with business goals and objectives
Lack of change management
Role-based access control
33. Occurs when the incoming level
Power surge/over voltage (spike)
Transmit e-mail messages
Monitoring processes
Annual loss expectancy (ALE)calculations
34. Only valid if assets have first been identified and appropriately valued.
Prioritization
Continuous analysis - monitoring and feedback
Annual loss expectancy (ALE)calculations
Nondisclosure agreement (NDA)
35. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Nondisclosure agreement (NDA)
Intrusion detection system (IDS)
Undervoltage (brownout)
Annually or whenever there is a significant change
36. Program that hides within or looks like a legit program
Classification of assets needs
Developing an information security baseline
Certificate authority (CA)
Trojan horse
37. Focuses on identifying vulnerabilities.
Strategic alignment of security with business objectives
Penetration testing
include security responsibilities in a job description
Vulnerability assessment
38. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Hacker
Breakeven point of risk reduction and cost
Safeguards over keys
Rule-based access control
39. ecurity design flaws require a ____________________.
Conduct a risk assessment
Developing an information security baseline
Asset classification
Deeper level of analysis
40. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Threat assessment
Virus detection
Prioritization
The data owner
41. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Monitoring processes
Fault-tolerant computer
Role-based policy
Detection defenses
42. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Cyber terrorist
Notifications and opt-out provisions
Audit objectives
Aligned with organizational goals
43. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Information security manager
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Data warehouse
Gap analysis
44. Normally addressed through antivirus and antispyware policies.
Lack of change management
Confidentiality
Malicious software and spyware
The authentication process is broken
45. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Rule-based access control
Consensus on risks and controls
Applying the proper classification to the data
Single sign-on (SSO) product
46. When the ________________ is more than the cost of the risk - the risk should be accepted.
Personal firewall
Cost of control
Normalization
Virus detection
47. Someone who accesses a computer or network illegally
Biometric access control systems
Hacker
Notifications and opt-out provisions
Use of security metrics
48. Inject malformed input.
Data owners
Cross-site scripting attacks
include security responsibilities in a job description
Role-based access control
49. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Identify the vulnerable systems and apply compensating controls
Threat assessment
Background checks of prospective employees
Countermeasure cost-benefit analysis
50. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Internal risk assessment
Baseline standard and then develop additional standards
Assess the risks to the business operation
Data warehouse