SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Company or person you believe will not send a virus-infect file knowingly
Applying the proper classification to the data
The data owner
Trusted source
The data custodian
2. A method for analyzing and reducing a relational database to its most streamlined form
Internal risk assessment
Residual risk would be reduced by a greater amount
Normalization
Cyber extortionist
3. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Monitoring processes
Hacker
Return on security investment (ROSI)
Key risk indicator (KRI) setup
4. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
Safeguards over keys
Public key infrastructure (PKI)
Performing a risk assessment
5. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Notifications and opt-out provisions
Role-based access control
Defining and ratifying the classification structure of information assets
Worm
6. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Inherent risk
Nondisclosure agreement (NDA)
Public key infrastructure (PKI)
Cryptographic secure sockets layer (SSL) implementations and short key lengths
7. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Fault-tolerant computer
Resource dependency assessment
Defining and ratifying the classification structure of information assets
Negotiating a local version of the organization standards
8. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
What happened and how the breach was resolved
Security risk
Process of introducing changes to systems
Negotiating a local version of the organization standards
9. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Data isolation
Encryption of the hard disks
Control risk
Decentralization
10. Ensure that transmitted information can be attributed to the named sender.
Assess the risks to the business operation
Transferred risk
Access control matrix
Digital signatures
11. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Reduce risk to an acceptable level
Residual risk would be reduced by a greater amount
Background checks of prospective employees
Virus
12. Oversees the overall classification management of the information.
Encryption
Tailgating
The information security officer
IP address packet filtering
13. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Tie security risks to key business objectives
Normalization
Role-based policy
Prioritization
14. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Role-based policy
Encryption
Trojan horse
Asset classification
15. BEST option to improve accountability for a system administrator is to _____________________.
SWOT analysis
Properly aligned with business goals and objectives
include security responsibilities in a job description
Virus detection
16. Without _____________________ - there cannot be accountability.
Annually or whenever there is a significant change
Public key infrastructure (PKI)
Well-defined roles and responsibilities
Information security manager
17. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
The authentication process is broken
Baseline standard and then develop additional standards
The awareness and agreement of the data subjects
Key controls
18. Uses security metrics to measure the performance of the information security program.
Security awareness training for all employees
Information security manager
Cost of control
Support the business objectives of the organization
19. Programs that act without a user's knowledge and deliberately alter a computer's operations
Decentralization
MAL wear
Continuous monitoring control initiatives
Cracker
20. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Hacker
Continuous monitoring control initiatives
Asset classification
Virus
21. A function of the session keys distributed by the PKI.
Total cost of ownership (TCO)
Countermeasure cost-benefit analysis
Data isolation
Confidentiality
22. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Knowledge management
Get senior management onboard
Cost of control
Annual loss expectancy (ALE)calculations
23. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
Assess the risks to the business operation
Increase business value and confidence
Risk management and the requirements of the organization
24. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Patch management
Trojan horse
Creation of a business continuity plan
Protective switch covers
25. The most important characteristic of good security policies is that they be ____________________.
Breakeven point of risk reduction and cost
Background check
Aligned with organizational goals
Digital certificate
26. The data owner is responsible for _______________________.
Applying the proper classification to the data
Platform security - intrusion detection and antivirus controls
Service level agreements (SLAs)
Properly aligned with business goals and objectives
27. Normally addressed through antivirus and antispyware policies.
Acceptable use policies
Malicious software and spyware
Security awareness training for all employees
Nondisclosure agreement (NDA)
28. Someone who uses the internet or network to destroy or damage computers for political reasons
Decentralization
MAL wear
Cyber terrorist
Public key infrastructure (PKI)
29. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Information contained on the equipment
Cracker
Intrusion detection system (IDS)
Security awareness training for all employees
30. Responsible for securing the information.
Annual loss expectancy (ALE)calculations
Cyber terrorist
The data custodian
Malicious software and spyware
31. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Service level agreements (SLAs)
Data warehouse
Key risk indicator (KRI) setup
Breakeven point of risk reduction and cost
32. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Performing a risk assessment
Malicious software and spyware
SWOT analysis
Background check
33. Cannot be minimized
Inherent risk
Annual loss expectancy (ALE)calculations
Safeguards over keys
The authentication process is broken
34. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Developing an information security baseline
Encryption of the hard disks
Well-defined roles and responsibilities
Virus detection
35. The PRIMARY goal in developing an information security strategy is to: _________________________.
Key controls
Support the business objectives of the organization
Patch management
Defining and ratifying the classification structure of information assets
36. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Role-based policy
Risk appetite
Vulnerability assessment
Baseline standard and then develop additional standards
37. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Classification of assets needs
Calculating the value of the information or asset
Process of introducing changes to systems
Asset classification
38. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Asset classification
Do with the information it collects
Security code reviews for the entire software application
Monitoring processes
39. An information security manager has to impress upon the human resources department the need for _____________________.
Baseline standard and then develop additional standards
Security awareness training for all employees
Monitoring processes
Rule-based access control
40. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Equal error rate (EER)
Do with the information it collects
Use of security metrics
Owner of the information asset
41. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Single sign-on (SSO) product
Impractical and is often cost-prohibitive
Examples of containment defenses
Knowledge management
42. Risk should be reduced to a level that an organization _____________.
Protective switch covers
Cracker
Is willing to accept
Role-based policy
43. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
The awareness and agreement of the data subjects
Residual risk would be reduced by a greater amount
Risk assessment - evaluation and impact analysis
Control risk
44. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Security risk
Data owners
Single sign-on (SSO) product
Role-based policy
45. Should PRIMARILY be based on regulatory and legal requirements.
Use of security metrics
Retention of business records
Internal risk assessment
Overall organizational structure
46. Should be a standard requirement for the service provider.
The data owner
Background check
Countermeasure cost-benefit analysis
Impractical and is often cost-prohibitive
47. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Tie security risks to key business objectives
Data classification
Intrusion detection system (IDS)
Phishing
48. A risk assessment should be conducted _________________.
Digital certificate
Properly aligned with business goals and objectives
Annually or whenever there is a significant change
Role-based access control
49. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Identify the relevant systems and processes
Tailgating
Control effectiveness
Requirements of the data owners
50. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Data isolation
Calculating the value of the information or asset
The data owner
Key risk indicator (KRI) setup