SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Whenever personal data are transferred across national boundaries; ________________________ are required.
The database administrator
Patch management process
Cracker
The awareness and agreement of the data subjects
2. By definition are not previously known and therefore are undetectable.
A network vulnerability assessment
The authentication process is broken
0-day vulnerabilities
Impractical and is often cost-prohibitive
3. A function of the session keys distributed by the PKI.
Confidentiality
Conduct a risk assessment
Biometric access control systems
Hacker
4. Provides strong online authentication.
Properly aligned with business goals and objectives
Public key infrastructure (PKI)
Worm
Cracker
5. The PRIMARY goal in developing an information security strategy is to: _________________________.
Well-defined roles and responsibilities
Background check
Support the business objectives of the organization
Logon banners
6. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Gap analysis
Properly aligned with business goals and objectives
Intrusion detection system (IDS)
Breakeven point of risk reduction and cost
7. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Cross-site scripting attacks
The data custodian
Data owners
Digital signatures
8. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Virus detection
Impractical and is often cost-prohibitive
What happened and how the breach was resolved
Residual risk would be reduced by a greater amount
9. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Reduce risk to an acceptable level
Data classification
Creation of a business continuity plan
Is willing to accept
10. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
IP address packet filtering
The data custodian
Risk assessment - evaluation and impact analysis
Biometric access control systems
11. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Detection defenses
Security risk
Intrusion detection system (IDS)
The authentication process is broken
12. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Nondisclosure agreement (NDA)
Comparison of cost of achievement
Vulnerability assessment
Annual loss expectancy (ALE)calculations
13. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Patch management
Return on security investment (ROSI)
Developing an information security baseline
Increase business value and confidence
14. BEST option to improve accountability for a system administrator is to _____________________.
Waterfall chart
Alignment with business strategy
Calculating the value of the information or asset
include security responsibilities in a job description
15. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Identify the vulnerable systems and apply compensating controls
Gap analysis
Rule-based access control
Impractical and is often cost-prohibitive
16. Useful but only with regard to specific technical skills.
Proficiency testing
Logon banners
Requirements of the data owners
Compliance with the organization's information security requirements
17. Program that hides within or looks like a legit program
OBusiness case development
Encryption
Comparison of cost of achievement
Trojan horse
18. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
SWOT analysis
Stress testing
Process of introducing changes to systems
Cracker
19. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Baseline standard and then develop additional standards
Script kiddie
Control risk
Intrusion detection system (IDS)
20. Without _____________________ - there cannot be accountability.
Increase business value and confidence
Encryption of the hard disks
Breakeven point of risk reduction and cost
Well-defined roles and responsibilities
21. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. Used to understand the flow of one process into another.
Logon banners
Impractical and is often cost-prohibitive
Consensus on risks and controls
Waterfall chart
23. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Data warehouse
Data owners
Gain unauthorized access to applications
Patch management
24. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
What happened and how the breach was resolved
Data classification
Patch management process
Centralization of information security management
25. Most effective for evaluating the degree to which information security objectives are being met.
Certificate authority (CA)
Is willing to accept
The balanced scorecard
Conduct a risk assessment
26. The most important characteristic of good security policies is that they be ____________________.
Prioritization
Gain unauthorized access to applications
Information security manager
Aligned with organizational goals
27. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Virus detection
Annually or whenever there is a significant change
OBusiness case development
Undervoltage (brownout)
28. Company or person you believe will not send a virus-infect file knowingly
Trusted source
Centralized structure
Deeper level of analysis
Undervoltage (brownout)
29. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
Annual loss expectancy (ALE)calculations
0-day vulnerabilities
Lack of change management
30. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Assess the risks to the business operation
Owner of the information asset
Tailgating
Defining high-level business security requirements
31. The job of the information security officer on a management team is to ___________________.
Confidentiality
The data owner
The data custodian
Assess the risks to the business operation
32. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Get senior management onboard
Confidentiality
Intrusion detection system (IDS)
Residual risk
33. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Cross-site scripting attacks
Centralized structure
Control effectiveness
Defining and ratifying the classification structure of information assets
34. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Aligned with organizational goals
Biometric access control systems
Gap analysis
Creation of a business continuity plan
35. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Data owners
Total cost of ownership (TCO)
Properly aligned with business goals and objectives
Worm
36. Occurs when the electrical supply drops
Cyber extortionist
Undervoltage (brownout)
Security risk
Trojan horse
37. Needs to define the access rules - which is troublesome and error prone in large organizations.
Rule-based access control
All personnel
Performing a risk assessment
Logon banners
38. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Transmit e-mail messages
Cross-site scripting attacks
Encryption
Defining and ratifying the classification structure of information assets
39. Applications cannot access data associated with other apps
Compliance with the organization's information security requirements
Properly aligned with business goals and objectives
Data isolation
Proficiency testing
40. Should be a standard requirement for the service provider.
Resource dependency assessment
Background check
Centralization of information security management
IP address packet filtering
41. The best measure for preventing the unauthorized disclosure of confidential information.
Acceptable use policies
Alignment with business strategy
Script kiddie
Cyber extortionist
42. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Encryption of the hard disks
Tie security risks to key business objectives
Service level agreements (SLAs)
Process of introducing changes to systems
43. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Threat assessment
Countermeasure cost-benefit analysis
Is willing to accept
Defined objectives
44. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Asset classification
Calculating the value of the information or asset
Consensus on risks and controls
Vulnerability assessment
45. It is easier to manage and control a _________________.
Centralized structure
Virus detection
Defining high-level business security requirements
Cyber extortionist
46. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Patch management process
Trusted source
Its ability to reduce or eliminate business risks
Logon banners
47. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Identify the vulnerable systems and apply compensating controls
Continuous analysis - monitoring and feedback
Audit objectives
Annual loss expectancy (ALE)calculations
48. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
Malicious software and spyware
Risk management and the requirements of the organization
Tailgating
OBusiness case development
49. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Phishing
Developing an information security baseline
Key controls
Monitoring processes
50. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Two-factor authentication
Virus detection
Residual risk would be reduced by a greater amount
Personal firewall