SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Normally addressed through antivirus and antispyware policies.
Support the business objectives of the organization
Consensus on risks and controls
Malicious software and spyware
Identify the relevant systems and processes
2. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Knowledge management
Script kiddie
Developing an information security baseline
Identify the vulnerable systems and apply compensating controls
3. Used to understand the flow of one process into another.
IP address packet filtering
Performing a risk assessment
Centralized structure
Waterfall chart
4. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Residual risk would be reduced by a greater amount
Monitoring processes
Trusted source
Identify the relevant systems and processes
5. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Cracker
Virus detection
BIA (Business Impact Assessment
Biometric access control systems
6. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Knowledge management
Key risk indicator (KRI) setup
Protective switch covers
Compliance with the organization's information security requirements
7. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Nondisclosure agreement (NDA)
Detection defenses
Negotiating a local version of the organization standards
Countermeasure cost-benefit analysis
8. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Gain unauthorized access to applications
The board of directors and senior management
Control effectiveness
Worm
9. The data owner is responsible for _______________________.
The data custodian
Vulnerability assessment
Continuous monitoring control initiatives
Applying the proper classification to the data
10. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Trojan horse
All personnel
Risk assessment - evaluation and impact analysis
Key risk indicator (KRI) setup
11. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Information contained on the equipment
Information security manager
Role-based access control
Negotiating a local version of the organization standards
12. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
All personnel
Regular review of access control lists
Monitoring processes
Developing an information security baseline
13. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
SWOT analysis
Inherent risk
What happened and how the breach was resolved
Malicious software and spyware
14. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Notifications and opt-out provisions
Transferred risk
Inherent risk
Patch management process
15. A method for analyzing and reducing a relational database to its most streamlined form
Rule-based access control
Normalization
Safeguards over keys
Background checks of prospective employees
16. Cannot be minimized
Virus detection
Proficiency testing
Data warehouse
Inherent risk
17. Someone who uses the internet or network to destroy or damage computers for political reasons
Public key infrastructure (PKI)
Overall organizational structure
Cyber terrorist
Deeper level of analysis
18. BEST option to improve accountability for a system administrator is to _____________________.
Background check
include security responsibilities in a job description
Reduce risk to an acceptable level
Certificate authority (CA)
19. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Security risk
Inherent risk
Background checks of prospective employees
A network vulnerability assessment
20. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Classification of assets needs
Cyber extortionist
Phishing
Security baselines
21. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Safeguards over keys
Two-factor authentication
Monitoring processes
Negotiating a local version of the organization standards
23. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Information contained on the equipment
Risk management and the requirements of the organization
Alignment with business strategy
24. Should PRIMARILY be based on regulatory and legal requirements.
The authentication process is broken
Defined objectives
Retention of business records
Calculating the value of the information or asset
25. The most important characteristic of good security policies is that they be ____________________.
The data custodian
Fault-tolerant computer
Control effectiveness
Aligned with organizational goals
26. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Cross-site scripting attacks
Prioritization
Defining and ratifying the classification structure of information assets
Performing a risk assessment
27. Should be performed to identify the risk and determine needed controls.
Residual risk would be reduced by a greater amount
Internal risk assessment
Data mart
Resource dependency assessment
28. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Its ability to reduce or eliminate business risks
Security risk
Encryption of the hard disks
Threat assessment
29. The primary role of the information security manager in the process of information classification within the organization.
Defining and ratifying the classification structure of information assets
Encryption of the hard disks
Security code reviews for the entire software application
Exceptions to policy
30. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Vulnerability assessment
A network vulnerability assessment
Worm
Risk management and the requirements of the organization
31. Identification and _______________ of business risk enables project managers to address areas with most significance.
Stress testing
Prioritization
Well-defined roles and responsibilities
Defining high-level business security requirements
32. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
What happened and how the breach was resolved
Baseline standard and then develop additional standards
Return on security investment (ROSI)
Security risk
33. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Attributes and characteristics of the 'desired state'
Is willing to accept
Aligned with organizational goals
Gain unauthorized access to applications
34. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
IP address packet filtering
Phishing
Asset classification
Risk appetite
35. Occurs after the risk assessment process - it does not measure it.
Hacker
Personal firewall
Waterfall chart
Use of security metrics
36. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Owner of the information asset
Information security manager
Control effectiveness
Baseline standard and then develop additional standards
37. Programs that act without a user's knowledge and deliberately alter a computer's operations
Digital certificate
Negotiating a local version of the organization standards
MAL wear
Personal firewall
38. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Rule-based access control
Well-defined roles and responsibilities
Equal error rate (EER)
Two-factor authentication
39. Information security governance models are highly dependent on the _____________________.
Overall organizational structure
Centralization of information security management
Do with the information it collects
Total cost of ownership (TCO)
40. Risk should be reduced to a level that an organization _____________.
Assess the risks to the business operation
Is willing to accept
Logon banners
Role-based access control
41. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
People
Examples of containment defenses
Information security manager
Total cost of ownership (TCO)
42. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Risk appetite
Regulatory compliance
Certificate authority (CA)
43. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Compliance with the organization's information security requirements
Virus detection
Examples of containment defenses
Total cost of ownership (TCO)
44. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Detection defenses
Phishing
Increase business value and confidence
What happened and how the breach was resolved
45. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
Encryption of the hard disks
Patch management process
Identify the relevant systems and processes
46. Company or person you believe will not send a virus-infect file knowingly
Control effectiveness
Tailgating
Trusted source
Risk assessment - evaluation and impact analysis
47. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Detection defenses
Do with the information it collects
Control effectiveness
Owner of the information asset
48. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Overall organizational structure
Continuous analysis - monitoring and feedback
Virus
Well-defined roles and responsibilities
49. Useful but only with regard to specific technical skills.
MAL wear
Proficiency testing
Virus detection
Fault-tolerant computer
50. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Do with the information it collects
Audit objectives
Regular review of access control lists
Skills inventory