SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Has full responsibility over data.
Security baselines
Single sign-on (SSO) product
The data owner
Increase business value and confidence
2. The PRIMARY goal in developing an information security strategy is to: _________________________.
Identify the vulnerable systems and apply compensating controls
Digital certificate
Support the business objectives of the organization
Overall organizational structure
3. A risk assessment should be conducted _________________.
Data isolation
Annually or whenever there is a significant change
Knowledge management
Background checks of prospective employees
4. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Performing a risk assessment
Safeguards over keys
Risk appetite
Logon banners
5. Utility program that detects and protects a personal computer from unauthorized intrusions
Data isolation
Digital signatures
Personal firewall
Undervoltage (brownout)
6. Would protect against spoofing an internal address but would not provide strong authentication.
Internal risk assessment
Certificate authority (CA)
IP address packet filtering
Hacker
7. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Stress testing
include security responsibilities in a job description
Monitoring processes
Residual risk would be reduced by a greater amount
8. Should be a standard requirement for the service provider.
Its ability to reduce or eliminate business risks
Continuous analysis - monitoring and feedback
Methodology used in the assessment
Background check
9. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
People
Risk management and the requirements of the organization
Audit objectives
Owner of the information asset
10. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Calculating the value of the information or asset
Security code reviews for the entire software application
Decentralization
Role-based access control
11. Identification and _______________ of business risk enables project managers to address areas with most significance.
Conduct a risk assessment
Gain unauthorized access to applications
Fault-tolerant computer
Prioritization
12. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Return on security investment (ROSI)
Detection defenses
Trojan horse
Defined objectives
13. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Centralized structure
Residual risk
Virus
Classification of assets needs
14. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Internal risk assessment
Risk assessment - evaluation and impact analysis
Power surge/over voltage (spike)
Monitoring processes
15. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
The database administrator
The authentication process is broken
Intrusion detection system (IDS)
Countermeasure cost-benefit analysis
16. Inject malformed input.
IP address packet filtering
Cracker
Residual risk would be reduced by a greater amount
Cross-site scripting attacks
17. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Centralization of information security management
Conduct a risk assessment
Confidentiality
What happened and how the breach was resolved
18. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Phishing
Encryption
The authentication process is broken
Do with the information it collects
19. Should be performed to identify the risk and determine needed controls.
Defining high-level business security requirements
Residual risk would be reduced by a greater amount
Internal risk assessment
The database administrator
20. All within the responsibility of the information security manager.
Platform security - intrusion detection and antivirus controls
Assess the risks to the business operation
Defined objectives
Data owners
21. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Defining high-level business security requirements
Well-defined roles and responsibilities
Calculating the value of the information or asset
Normalization
22. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Virus
Use of security metrics
23. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Certificate authority (CA)
Assess the risks to the business operation
Biometric access control systems
Creation of a business continuity plan
24. Most effective for evaluating the degree to which information security objectives are being met.
Knowledge management
The balanced scorecard
Examples of containment defenses
Retention of business records
25. Occurs when the electrical supply drops
Worm
The information security officer
Undervoltage (brownout)
Risk appetite
26. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Compliance with the organization's information security requirements
Identify the relevant systems and processes
Prioritization
Residual risk
27. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Knowledge management
Vulnerability assessment
Proficiency testing
Normalization
28. provides the most effective protection of data on mobile devices.
Virus detection
Data mart
Encryption
Safeguards over keys
29. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Cracker
Identify the relevant systems and processes
Digital signatures
Single sign-on (SSO) product
30. Programs that act without a user's knowledge and deliberately alter a computer's operations
MAL wear
Audit objectives
Do with the information it collects
Total cost of ownership (TCO)
31. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Decentralization
Residual risk would be reduced by a greater amount
Get senior management onboard
Compliance with the organization's information security requirements
32. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
MAL wear
Transferred risk
Service level agreements (SLAs)
Get senior management onboard
33. Accesses a computer or network illegally
Phishing
Alignment with business strategy
Fault-tolerant computer
Cracker
34. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
Lack of change management
Security baselines
Increase business value and confidence
35. The primary role of the information security manager in the process of information classification within the organization.
Conduct a risk assessment
Decentralization
Proficiency testing
Defining and ratifying the classification structure of information assets
36. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Aligned with organizational goals
Penetration testing
Encryption of the hard disks
Breakeven point of risk reduction and cost
37. Responsible for securing the information.
Properly aligned with business goals and objectives
Cyber terrorist
The balanced scorecard
The data custodian
38. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Data owners
Access control matrix
Properly aligned with business goals and objectives
Decentralization
39. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Threat assessment
Worm
The authentication process is broken
Aligned with organizational goals
40. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Methodology used in the assessment
Owner of the information asset
Data owners
Role-based policy
42. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
The balanced scorecard
Defining high-level business security requirements
Transferred risk
43. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
All personnel
Role-based access control
Continuous analysis - monitoring and feedback
Get senior management onboard
44. Useful but only with regard to specific technical skills.
Cost of control
All personnel
Proficiency testing
SWOT analysis
45. Needs to define the access rules - which is troublesome and error prone in large organizations.
BIA (Business Impact Assessment
Virus detection
Security risk
Rule-based access control
46. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Compliance with the organization's information security requirements
The balanced scorecard
Key risk indicator (KRI) setup
Identify the vulnerable systems and apply compensating controls
47. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Proficiency testing
Regulatory compliance
Lack of change management
Data warehouse
48. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. A method for analyzing and reducing a relational database to its most streamlined form
Is willing to accept
Normalization
The information security officer
Equal error rate (EER)
50. Used to understand the flow of one process into another.
Encryption key management
Waterfall chart
Control risk
Residual risk