SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Acceptable use policies
Patch management
Attributes and characteristics of the 'desired state'
Prioritization
2. Primarily reduce risk and are most effective for the protection of information assets.
Key controls
Negotiating a local version of the organization standards
Performing a risk assessment
Equal error rate (EER)
3. By definition are not previously known and therefore are undetectable.
0-day vulnerabilities
Countermeasure cost-benefit analysis
A network vulnerability assessment
Cyber terrorist
4. Computer that has duplicate components so it can continue to operate when one of its main components fail
Fault-tolerant computer
Continuous analysis - monitoring and feedback
Stress testing
Examples of containment defenses
5. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Biometric access control systems
Process of introducing changes to systems
Retention of business records
Baseline standard and then develop additional standards
6. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
The data owner
All personnel
Do with the information it collects
7. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Vulnerability assessment
Access control matrix
Data classification
Knowledge management
8. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Monitoring processes
Power surge/over voltage (spike)
Owner of the information asset
Well-defined roles and responsibilities
9. Responsible for securing the information.
The data custodian
The balanced scorecard
Residual risk would be reduced by a greater amount
Intrusion detection system (IDS)
10. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Normalization
Continuous monitoring control initiatives
Monitoring processes
OBusiness case development
11. S small warehouse - designed for the end-user needs in a strategic business unit
Proficiency testing
Data mart
Data isolation
Retention of business records
12. A repository of historical data organized by subject to support decision makers in the org
Compliance with the organization's information security requirements
Data warehouse
Digital certificate
Calculating the value of the information or asset
13. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Digital certificate
Classification of assets needs
Key risk indicator (KRI) setup
Countermeasure cost-benefit analysis
14. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Cyber extortionist
Tailgating
Security baselines
Background checks of prospective employees
15. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Two-factor authentication
Phishing
Asset classification
16. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Virus detection
Information contained on the equipment
Gain unauthorized access to applications
Notifications and opt-out provisions
17. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Requirements of the data owners
Cyber extortionist
The balanced scorecard
Asset classification
18. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Encryption key management
Performing a risk assessment
Knowledge management
Trojan horse
19. The job of the information security officer on a management team is to ___________________.
include security responsibilities in a job description
Strategic alignment of security with business objectives
Assess the risks to the business operation
Creation of a business continuity plan
20. Cannot be minimized
0-day vulnerabilities
Intrusion detection system (IDS)
Inherent risk
Cryptographic secure sockets layer (SSL) implementations and short key lengths
21. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
0-day vulnerabilities
Intrusion detection system (IDS)
Regular review of access control lists
Control effectiveness
22. Accesses a computer or network illegally
Encryption
Performing a risk assessment
Cracker
Strategic alignment of security with business objectives
23. All within the responsibility of the information security manager.
Impractical and is often cost-prohibitive
Single sign-on (SSO) product
Equal error rate (EER)
Platform security - intrusion detection and antivirus controls
24. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Confidentiality
Continuous monitoring control initiatives
Control effectiveness
Information contained on the equipment
25. Focuses on identifying vulnerabilities.
Support the business objectives of the organization
Penetration testing
Digital certificate
Reduce risk to an acceptable level
26. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Spoofing attacks
Single sign-on (SSO) product
Control effectiveness
Compliance with the organization's information security requirements
27. Utility program that detects and protects a personal computer from unauthorized intrusions
Confidentiality
Breakeven point of risk reduction and cost
Internal risk assessment
Personal firewall
28. To identify known vulnerabilities based on common misconfigurations and missing updates.
Annual loss expectancy (ALE)calculations
A network vulnerability assessment
Negotiating a local version of the organization standards
Skills inventory
29. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Information security manager
Protective switch covers
Data classification
Gain unauthorized access to applications
30. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
BIA (Business Impact Assessment
Continuous monitoring control initiatives
Protective switch covers
Monitoring processes
31. Information security governance models are highly dependent on the _____________________.
People
Overall organizational structure
Do with the information it collects
The board of directors and senior management
32. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Developing an information security baseline
Knowledge management
A network vulnerability assessment
Applying the proper classification to the data
33. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Negotiating a local version of the organization standards
Get senior management onboard
Service level agreements (SLAs)
Regular review of access control lists
34. When defining the information classification policy - the ___________________ need to be identified.
Requirements of the data owners
Knowledge management
Alignment with business strategy
Control effectiveness
35. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
Annual loss expectancy (ALE)calculations
Virus
Role-based access control
37. Someone who accesses a computer or network illegally
Aligned with organizational goals
Classification of assets needs
Role-based access control
Hacker
38. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Its ability to reduce or eliminate business risks
IP address packet filtering
Intrusion detection system (IDS)
A network vulnerability assessment
39. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Patch management process
Identify the relevant systems and processes
Methodology used in the assessment
Applying the proper classification to the data
40. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Transferred risk
Acceptable use policies
Waterfall chart
Worm
41. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
Encryption key management
Prioritization
Use of security metrics
42. The PRIMARY goal in developing an information security strategy is to: _________________________.
Encryption of the hard disks
Examples of containment defenses
0-day vulnerabilities
Support the business objectives of the organization
43. Applications cannot access data associated with other apps
Data isolation
Regular review of access control lists
Audit objectives
Gap analysis
44. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Biometric access control systems
Classification of assets needs
The authentication process is broken
Continuous monitoring control initiatives
45. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Certificate authority (CA)
Encryption key management
Data owners
Security risk
46. Same intent as a cracker but does not have the technical skills and knowledge
The information security officer
Script kiddie
Power surge/over voltage (spike)
Annual loss expectancy (ALE)calculations
47. The information security manager needs to prioritize the controls based on ________________________.
include security responsibilities in a job description
Background checks of prospective employees
Total cost of ownership (TCO)
Risk management and the requirements of the organization
48. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Cost of control
Risk appetite
Encryption of the hard disks
Intrusion detection system (IDS)
49. Should be performed to identify the risk and determine needed controls.
Well-defined roles and responsibilities
Malicious software and spyware
Baseline standard and then develop additional standards
Internal risk assessment
50. Occurs when the incoming level
Continuous monitoring control initiatives
Developing an information security baseline
Power surge/over voltage (spike)
Continuous analysis - monitoring and feedback
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests