SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Occurs when the incoming level
Power surge/over voltage (spike)
Control risk
Support the business objectives of the organization
Applying the proper classification to the data
2. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Control effectiveness
Defining and ratifying the classification structure of information assets
Single sign-on (SSO) product
Risk appetite
3. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Asset classification
Waterfall chart
Information contained on the equipment
Prioritization
4. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
Defining and ratifying the classification structure of information assets
Protective switch covers
Detection defenses
Skills inventory
5. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Security risk
Examples of containment defenses
Notifications and opt-out provisions
Spoofing attacks
6. Provides strong online authentication.
Public key infrastructure (PKI)
Creation of a business continuity plan
Information contained on the equipment
Patch management
7. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Two-factor authentication
Tailgating
Vulnerability assessment
Regular review of access control lists
8. Same intent as a cracker but does not have the technical skills and knowledge
Confidentiality
A network vulnerability assessment
Digital signatures
Script kiddie
9. Provide metrics to which outsourcing firms can be held accountable.
Return on security investment (ROSI)
Service level agreements (SLAs)
Certificate authority (CA)
Data classification
10. Responsible for securing the information.
The data custodian
Owner of the information asset
Classification of assets needs
Threat assessment
11. New security ulnerabilities should be managed through a ________________.
Patch management process
Developing an information security baseline
Cost of control
Defining high-level business security requirements
12. Computer that has duplicate components so it can continue to operate when one of its main components fail
Fault-tolerant computer
Residual risk
0-day vulnerabilities
The balanced scorecard
13. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Gain unauthorized access to applications
Cyber extortionist
Support the business objectives of the organization
Reduce risk to an acceptable level
14. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Exceptions to policy
Regulatory compliance
Prioritization
Deeper level of analysis
15. Only valid if assets have first been identified and appropriately valued.
Transmit e-mail messages
Fault-tolerant computer
Digital certificate
Annual loss expectancy (ALE)calculations
16. Has full responsibility over data.
The balanced scorecard
Requirements of the data owners
0-day vulnerabilities
The data owner
17. When the ________________ is more than the cost of the risk - the risk should be accepted.
Centralization of information security management
Breakeven point of risk reduction and cost
Cost of control
Requirements of the data owners
18. Risk should be reduced to a level that an organization _____________.
Defining and ratifying the classification structure of information assets
Data mart
Is willing to accept
Acceptable use policies
19. Needs to define the access rules - which is troublesome and error prone in large organizations.
Assess the risks to the business operation
Rule-based access control
Confidentiality
Hacker
20. Without _____________________ - there cannot be accountability.
Data warehouse
0-day vulnerabilities
Decentralization
Well-defined roles and responsibilities
21. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Total cost of ownership (TCO)
The board of directors and senior management
Process of introducing changes to systems
The balanced scorecard
22. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Worm
Properly aligned with business goals and objectives
Hacker
Data classification
23. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Calculating the value of the information or asset
Data owners
Detection defenses
Asset classification
24. The most important characteristic of good security policies is that they be ____________________.
Fault-tolerant computer
Security code reviews for the entire software application
Safeguards over keys
Aligned with organizational goals
25. Has to be integrated into the requirements of every software application's design.
Encryption key management
Audit objectives
Transmit e-mail messages
Exceptions to policy
26. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Identify the vulnerable systems and apply compensating controls
Countermeasure cost-benefit analysis
Decentralization
Penetration testing
27. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Multinational organization
Do with the information it collects
What happened and how the breach was resolved
Logon banners
28. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
BIA (Business Impact Assessment
Process of introducing changes to systems
Residual risk
The authentication process is broken
29. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Certificate authority (CA)
The data owner
Its ability to reduce or eliminate business risks
Applying the proper classification to the data
30. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Data classification
Intrusion detection system (IDS)
Well-defined roles and responsibilities
Asset classification
31. Information security governance models are highly dependent on the _____________________.
Data warehouse
Overall organizational structure
Normalization
Centralization of information security management
32. Would protect against spoofing an internal address but would not provide strong authentication.
Creation of a business continuity plan
BIA (Business Impact Assessment
IP address packet filtering
Patch management process
33. Programs that act without a user's knowledge and deliberately alter a computer's operations
MAL wear
Increase business value and confidence
Data classification
Impractical and is often cost-prohibitive
34. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Performing a risk assessment
Personal firewall
Is willing to accept
Classification of assets needs
35. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Intrusion detection system (IDS)
Patch management
Methodology used in the assessment
Undervoltage (brownout)
36. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Consensus on risks and controls
Increase business value and confidence
Reduce risk to an acceptable level
Role-based access control
37. A method for analyzing and reducing a relational database to its most streamlined form
Defined objectives
Normalization
SWOT analysis
Digital signatures
38. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
Safeguards over keys
Power surge/over voltage (spike)
Aligned with organizational goals
39. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
BIA (Business Impact Assessment
Encryption of the hard disks
Role-based policy
Two-factor authentication
40. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Return on security investment (ROSI)
Encryption of the hard disks
Access control matrix
Rule-based access control
41. A function of the session keys distributed by the PKI.
The board of directors and senior management
Centralization of information security management
Confidentiality
Compliance with the organization's information security requirements
42. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Identify the vulnerable systems and apply compensating controls
The information security officer
Logon banners
Single sign-on (SSO) product
43. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Centralization of information security management
BIA (Business Impact Assessment
Risk management and the requirements of the organization
Calculating the value of the information or asset
44. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Total cost of ownership (TCO)
Role-based policy
Data mart
Continuous monitoring control initiatives
45. S small warehouse - designed for the end-user needs in a strategic business unit
Methodology used in the assessment
Data mart
Normalization
Trusted source
46. Culture has a significant impact on how information security will be implemented in a ______________________.
Multinational organization
Get senior management onboard
Increase business value and confidence
Access control matrix
47. It is easier to manage and control a _________________.
Defining high-level business security requirements
Alignment with business strategy
Centralized structure
Residual risk
48. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Examples of containment defenses
The database administrator
Security baselines
Safeguards over keys
49. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Rule-based access control
Tailgating
Get senior management onboard
Cost of control
50. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Digital certificate
Tailgating
Certificate authority (CA)
The awareness and agreement of the data subjects