SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Background checks of prospective employees
Logon banners
Detection defenses
Creation of a business continuity plan
2. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Normalization
Return on security investment (ROSI)
Access control matrix
Security risk
3. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Protective switch covers
Equal error rate (EER)
Logon banners
Data owners
4. Someone who uses the internet or network to destroy or damage computers for political reasons
Lack of change management
Cyber terrorist
Identify the vulnerable systems and apply compensating controls
Gain unauthorized access to applications
5. Provide metrics to which outsourcing firms can be held accountable.
Internal risk assessment
Service level agreements (SLAs)
Identify the vulnerable systems and apply compensating controls
Overall organizational structure
6. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Penetration testing
Background checks of prospective employees
Asset classification
Intrusion detection system (IDS)
7. Would protect against spoofing an internal address but would not provide strong authentication.
Cyber terrorist
Personal firewall
IP address packet filtering
The balanced scorecard
8. It is easier to manage and control a _________________.
Normalization
Centralized structure
Certificate authority (CA)
Two-factor authentication
9. Responsible for securing the information.
Aligned with organizational goals
Access control matrix
IP address packet filtering
The data custodian
10. A notice that guarantees a user or a web site is legitimate
Role-based policy
Safeguards over keys
Digital certificate
Key controls
11. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Control risk
Risk appetite
Multinational organization
Equal error rate (EER)
12. Ensure that transmitted information can be attributed to the named sender.
Risk management and the requirements of the organization
Digital signatures
OBusiness case development
Cyber extortionist
13. An information security manager has to impress upon the human resources department the need for _____________________.
Waterfall chart
IP address packet filtering
Security awareness training for all employees
Hacker
14. Most effective for evaluating the degree to which information security objectives are being met.
Residual risk would be reduced by a greater amount
The balanced scorecard
Penetration testing
Return on security investment (ROSI)
15. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Decentralization
OBusiness case development
Vulnerability assessment
Hacker
16. When defining the information classification policy - the ___________________ need to be identified.
Baseline standard and then develop additional standards
Methodology used in the assessment
Return on security investment (ROSI)
Requirements of the data owners
17. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.
Key risk indicator (KRI) setup
Certificate authority (CA)
Residual risk would be reduced by a greater amount
Centralization of information security management
18. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Use of security metrics
Patch management
Equal error rate (EER)
SWOT analysis
19. Inject malformed input.
Comparison of cost of achievement
Security code reviews for the entire software application
Threat assessment
Cross-site scripting attacks
20. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Gain unauthorized access to applications
Deeper level of analysis
Properly aligned with business goals and objectives
The board of directors and senior management
21. Information security governance models are highly dependent on the _____________________.
Overall organizational structure
Personal firewall
Fault-tolerant computer
Creation of a business continuity plan
22. Should be determined from the risk assessment results.
Audit objectives
include security responsibilities in a job description
Cyber terrorist
Equal error rate (EER)
23. Should be performed to identify the risk and determine needed controls.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Internal risk assessment
Intrusion detection system (IDS)
Data classification
24. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Skills inventory
Security baselines
Defining and ratifying the classification structure of information assets
Role-based policy
25. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Two-factor authentication
Comparison of cost of achievement
Risk management and the requirements of the organization
Patch management
26. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
The database administrator
All personnel
Role-based access control
Threat assessment
27. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Digital certificate
Script kiddie
The awareness and agreement of the data subjects
28. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Cost of control
Total cost of ownership (TCO)
Identify the vulnerable systems and apply compensating controls
Baseline standard and then develop additional standards
29. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Its ability to reduce or eliminate business risks
Requirements of the data owners
Data classification
Decentralization
30. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Virus
Aligned with organizational goals
The authentication process is broken
Proficiency testing
31. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Annual loss expectancy (ALE)calculations
Residual risk
Do with the information it collects
Annually or whenever there is a significant change
32. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Residual risk
Certificate authority (CA)
Owner of the information asset
The database administrator
33. Awareness - training and physical security defenses.
Worm
Security awareness training for all employees
Examples of containment defenses
A network vulnerability assessment
34. Ensures that there are no scalability problems.
Annual loss expectancy (ALE)calculations
Compliance with the organization's information security requirements
Defining high-level business security requirements
Stress testing
35. Without _____________________ - there cannot be accountability.
Well-defined roles and responsibilities
Trusted source
Multinational organization
Applying the proper classification to the data
36. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Countermeasure cost-benefit analysis
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Get senior management onboard
Baseline standard and then develop additional standards
37. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Cost of control
Developing an information security baseline
Notifications and opt-out provisions
Risk assessment - evaluation and impact analysis
38. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Virus
Digital certificate
Two-factor authentication
Background checks of prospective employees
39. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
BIA (Business Impact Assessment
Negotiating a local version of the organization standards
Key controls
40. The information security manager needs to prioritize the controls based on ________________________.
Risk management and the requirements of the organization
The information security officer
0-day vulnerabilities
Power surge/over voltage (spike)
41. Oversees the overall classification management of the information.
The information security officer
Data classification
Continuous analysis - monitoring and feedback
Cyber terrorist
42. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Increase business value and confidence
Fault-tolerant computer
Virus detection
Prioritization
43. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Comparison of cost of achievement
Prioritization
Security risk
Process of introducing changes to systems
44. A risk assessment should be conducted _________________.
Applying the proper classification to the data
Audit objectives
Annually or whenever there is a significant change
Monitoring processes
45. All within the responsibility of the information security manager.
Transmit e-mail messages
Information security manager
Platform security - intrusion detection and antivirus controls
Do with the information it collects
46. Carries out the technical administration.
The database administrator
All personnel
Reduce risk to an acceptable level
Transferred risk
47. New security ulnerabilities should be managed through a ________________.
Attributes and characteristics of the 'desired state'
Continuous analysis - monitoring and feedback
Patch management process
Detection defenses
48. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Lack of change management
Baseline standard and then develop additional standards
Spoofing attacks
The data custodian
49. Culture has a significant impact on how information security will be implemented in a ______________________.
Detection defenses
Residual risk would be reduced by a greater amount
Multinational organization
Defining high-level business security requirements
50. Should be a standard requirement for the service provider.
Background check
Data owners
Fault-tolerant computer
Security awareness training for all employees