SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Responsible for securing the information.
Stress testing
Regular review of access control lists
Owner of the information asset
The data custodian
2. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Creation of a business continuity plan
Undervoltage (brownout)
Total cost of ownership (TCO)
Countermeasure cost-benefit analysis
3. Would protect against spoofing an internal address but would not provide strong authentication.
Undervoltage (brownout)
The data custodian
Digital certificate
IP address packet filtering
4. Provide metrics to which outsourcing firms can be held accountable.
Service level agreements (SLAs)
Aligned with organizational goals
Security risk
Single sign-on (SSO) product
5. The most important characteristic of good security policies is that they be ____________________.
Cyber extortionist
Security risk
Classification of assets needs
Aligned with organizational goals
6. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Internal risk assessment
Exceptions to policy
Alignment with business strategy
7. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Skills inventory
Risk management and the requirements of the organization
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Two-factor authentication
8. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Baseline standard and then develop additional standards
Cyber extortionist
Penetration testing
Control risk
9. Needs to define the access rules - which is troublesome and error prone in large organizations.
Monitoring processes
Rule-based access control
Worm
Platform security - intrusion detection and antivirus controls
10. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Negotiating a local version of the organization standards
Regular review of access control lists
Methodology used in the assessment
Encryption of the hard disks
11. Occurs after the risk assessment process - it does not measure it.
Process of introducing changes to systems
Logon banners
Use of security metrics
Alignment with business strategy
12. The data owner is responsible for _______________________.
The data custodian
Applying the proper classification to the data
Audit objectives
Continuous analysis - monitoring and feedback
13. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Internal risk assessment
Tailgating
Total cost of ownership (TCO)
People
14. n a _________________________ - the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure.
Transferred risk
Role-based policy
Residual risk would be reduced by a greater amount
Countermeasure cost-benefit analysis
15. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Certificate authority (CA)
Use of security metrics
Worm
Service level agreements (SLAs)
16. The information security manager needs to prioritize the controls based on ________________________.
Inherent risk
Performing a risk assessment
Risk management and the requirements of the organization
Cyber terrorist
17. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Residual risk
Impractical and is often cost-prohibitive
Multinational organization
Transferred risk
18. Only valid if assets have first been identified and appropriately valued.
Annual loss expectancy (ALE)calculations
Process of introducing changes to systems
Owner of the information asset
Baseline standard and then develop additional standards
19. Same intent as a cracker but does not have the technical skills and knowledge
Script kiddie
Defining and ratifying the classification structure of information assets
Normalization
Its ability to reduce or eliminate business risks
20. A repository of historical data organized by subject to support decision makers in the org
Penetration testing
Data owners
Data warehouse
Data mart
21. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Decentralization
Prioritization
Key controls
Alignment with business strategy
22. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Decentralization
Strategic alignment of security with business objectives
Nondisclosure agreement (NDA)
Performing a risk assessment
23. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Information contained on the equipment
Well-defined roles and responsibilities
Countermeasure cost-benefit analysis
24. Risk should be reduced to a level that an organization _____________.
Comparison of cost of achievement
Two-factor authentication
Is willing to accept
Negotiating a local version of the organization standards
25. Provides process needs but not impact.
Resource dependency assessment
Security awareness training for all employees
The data custodian
Security baselines
26. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Lack of change management
Access control matrix
Defined objectives
Safeguards over keys
27. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
Security code reviews for the entire software application
Regulatory compliance
Alignment with business strategy
28. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
All personnel
Continuous monitoring control initiatives
Single sign-on (SSO) product
Data mart
29. The PRIMARY goal in developing an information security strategy is to: _________________________.
Risk management and the requirements of the organization
Use of security metrics
Centralization of information security management
Support the business objectives of the organization
30. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Decentralization
Strategic alignment of security with business objectives
Skills inventory
Background checks of prospective employees
32. Primarily reduce risk and are most effective for the protection of information assets.
Continuous monitoring control initiatives
Key controls
Key risk indicator (KRI) setup
Asset classification
33. Without _____________________ - there cannot be accountability.
Data owners
Risk appetite
Well-defined roles and responsibilities
Classification of assets needs
34. Focuses on identifying vulnerabilities.
Nondisclosure agreement (NDA)
Background checks of prospective employees
Penetration testing
Lack of change management
35. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Biometric access control systems
Increase business value and confidence
Trojan horse
Gap analysis
36. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
BIA (Business Impact Assessment
Waterfall chart
Conduct a risk assessment
Strategic alignment of security with business objectives
37. When defining the information classification policy - the ___________________ need to be identified.
Regular review of access control lists
Requirements of the data owners
Tailgating
Prioritization
38. Used to understand the flow of one process into another.
Intrusion detection system (IDS)
Annual loss expectancy (ALE)calculations
Role-based access control
Waterfall chart
39. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Regulatory compliance
Continuous monitoring control initiatives
Penetration testing
Strategic alignment of security with business objectives
40. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Two-factor authentication
Requirements of the data owners
Virus detection
Monitoring processes
41. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Company or person you believe will not send a virus-infect file knowingly
Data isolation
Risk assessment - evaluation and impact analysis
Trusted source
Worm
43. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Regular review of access control lists
Role-based access control
Support the business objectives of the organization
Developing an information security baseline
44. Normally addressed through antivirus and antispyware policies.
Asset classification
Deeper level of analysis
Malicious software and spyware
Developing an information security baseline
45. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Multinational organization
Its ability to reduce or eliminate business risks
Nondisclosure agreement (NDA)
Data owners
46. Should be performed to identify the risk and determine needed controls.
Resource dependency assessment
Classification of assets needs
Information contained on the equipment
Internal risk assessment
47. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Calculating the value of the information or asset
Creation of a business continuity plan
Detection defenses
Annual loss expectancy (ALE)calculations
48. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Personal firewall
Performing a risk assessment
Safeguards over keys
Impractical and is often cost-prohibitive
49. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
BIA (Business Impact Assessment
Single sign-on (SSO) product
Cyber extortionist
Assess the risks to the business operation
50. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Use of security metrics
Identify the relevant systems and processes
Intrusion detection system (IDS)
Vulnerability assessment