SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Alignment with business strategy
Platform security - intrusion detection and antivirus controls
Spoofing attacks
The authentication process is broken
2. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Multinational organization
Data classification
Patch management
Identify the relevant systems and processes
3. A notice that guarantees a user or a web site is legitimate
Digital certificate
Single sign-on (SSO) product
OBusiness case development
Exceptions to policy
4. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Gain unauthorized access to applications
Skills inventory
Decentralization
Fault-tolerant computer
5. Same intent as a cracker but does not have the technical skills and knowledge
Virus
Script kiddie
Cost of control
Nondisclosure agreement (NDA)
6. A method for analyzing and reducing a relational database to its most streamlined form
Notifications and opt-out provisions
Key risk indicator (KRI) setup
Normalization
Rule-based access control
7. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Gain unauthorized access to applications
Access control matrix
Worm
Logon banners
9. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Two-factor authentication
Centralized structure
Defining high-level business security requirements
Patch management process
10. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Transmit e-mail messages
Multinational organization
Biometric access control systems
Use of security metrics
11. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Increase business value and confidence
Aligned with organizational goals
Phishing
Use of security metrics
12. provides the most effective protection of data on mobile devices.
Risk management and the requirements of the organization
Encryption
Background checks of prospective employees
Data isolation
13. The primary role of the information security manager in the process of information classification within the organization.
Defining and ratifying the classification structure of information assets
Negotiating a local version of the organization standards
The authentication process is broken
SWOT analysis
14. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Public key infrastructure (PKI)
Acceptable use policies
Nondisclosure agreement (NDA)
Conduct a risk assessment
15. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
SWOT analysis
Undervoltage (brownout)
Retention of business records
Centralization of information security management
16. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Do with the information it collects
Annual loss expectancy (ALE)calculations
Fault-tolerant computer
The board of directors and senior management
17. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Nondisclosure agreement (NDA)
Service level agreements (SLAs)
Increase business value and confidence
Risk appetite
18. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Two-factor authentication
Background checks of prospective employees
Methodology used in the assessment
Gain unauthorized access to applications
19. Awareness - training and physical security defenses.
Methodology used in the assessment
Examples of containment defenses
Undervoltage (brownout)
Fault-tolerant computer
20. Reducing risk to a level too small to measure is _______________.
Impractical and is often cost-prohibitive
Encryption key management
Process of introducing changes to systems
Examples of containment defenses
21. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
Proficiency testing
Use of security metrics
Tailgating
22. Ensure that transmitted information can be attributed to the named sender.
Regular review of access control lists
Inherent risk
Digital signatures
Internal risk assessment
23. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Comparison of cost of achievement
Assess the risks to the business operation
Asset classification
Continuous monitoring control initiatives
24. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Phishing
Lack of change management
Exceptions to policy
Encryption
25. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Cross-site scripting attacks
Regulatory compliance
Calculating the value of the information or asset
Notifications and opt-out provisions
26. Occurs after the risk assessment process - it does not measure it.
Key risk indicator (KRI) setup
Annually or whenever there is a significant change
People
Use of security metrics
27. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Encryption
Cyber extortionist
Control effectiveness
Data mart
28. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
Risk appetite
The balanced scorecard
Service level agreements (SLAs)
29. A key indicator of performance measurement.
Strategic alignment of security with business objectives
Digital certificate
IP address packet filtering
Trojan horse
30. When the ________________ is more than the cost of the risk - the risk should be accepted.
Cost of control
Is willing to accept
Knowledge management
Gain unauthorized access to applications
31. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Data classification
All personnel
Public key infrastructure (PKI)
Two-factor authentication
32. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Impractical and is often cost-prohibitive
Virus
Safeguards over keys
Rule-based access control
33. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Risk management and the requirements of the organization
Cyber extortionist
Well-defined roles and responsibilities
Cross-site scripting attacks
34. An information security manager has to impress upon the human resources department the need for _____________________.
Defining and ratifying the classification structure of information assets
Residual risk would be reduced by a greater amount
Security awareness training for all employees
Support the business objectives of the organization
35. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
Intrusion detection system (IDS)
Annually or whenever there is a significant change
Resource dependency assessment
36. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
The balanced scorecard
Phishing
Baseline standard and then develop additional standards
37. Only valid if assets have first been identified and appropriately valued.
Calculating the value of the information or asset
Regular review of access control lists
Annual loss expectancy (ALE)calculations
The information security officer
38. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Security code reviews for the entire software application
Transmit e-mail messages
The authentication process is broken
Defining high-level business security requirements
39. Would protect against spoofing an internal address but would not provide strong authentication.
IP address packet filtering
Logon banners
Regular review of access control lists
Personal firewall
40. Should be a standard requirement for the service provider.
Background check
Decentralization
IP address packet filtering
Phishing
41. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Creation of a business continuity plan
Security baselines
Information security manager
All personnel
42. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Cyber terrorist
Transferred risk
Cross-site scripting attacks
Protective switch covers
43. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Phishing
Gap analysis
Baseline standard and then develop additional standards
A network vulnerability assessment
44. Primarily reduce risk and are most effective for the protection of information assets.
Protective switch covers
Negotiating a local version of the organization standards
Key controls
Public key infrastructure (PKI)
45. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Examples of containment defenses
Cyber terrorist
Continuous analysis - monitoring and feedback
Exceptions to policy
46. S small warehouse - designed for the end-user needs in a strategic business unit
Data mart
Methodology used in the assessment
The information security officer
Safeguards over keys
47. Should be performed to identify the risk and determine needed controls.
Internal risk assessment
Its ability to reduce or eliminate business risks
Encryption key management
Comparison of cost of achievement
48. Useful but only with regard to specific technical skills.
Audit objectives
Proficiency testing
Intrusion detection system (IDS)
Defining high-level business security requirements
49. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Defined objectives
Gain unauthorized access to applications
Cross-site scripting attacks
Annual loss expectancy (ALE)calculations
50. New security ulnerabilities should be managed through a ________________.
Get senior management onboard
Patch management process
Risk management and the requirements of the organization
Defining and ratifying the classification structure of information assets