Test your basic knowledge |

CISM: Certified Information Security Manager

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.






2. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.






3. A key indicator of performance measurement.






4. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.






5. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.






6. Same intent as a cracker but does not have the technical skills and knowledge






7. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


8. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.






9. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.






10. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.






11. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.






12. Inject malformed input.






13. Results in greater uniformity and better adherence to security policies. It is generally less expensive to administer due to the economies of scale. However - turnaround can be slower due to the lack of alignment with business units.






14. By definition are not previously known and therefore are undetectable.






15. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.






16. Most effective for evaluating the degree to which information security objectives are being met.






17. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.






18. Utility program that detects and protects a personal computer from unauthorized intrusions






19. A function of the session keys distributed by the PKI.






20. Uses security metrics to measure the performance of the information security program.






21. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.






22. A Successful risk management should lead to a ________________.






23. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e






24. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network






25. Useful but only with regard to specific technical skills.






26. The BEST justification to convince management to invest in an information security program is that doing so would _________________.






27. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.






28. Risk should be reduced to a level that an organization _____________.






29. Computer that has duplicate components so it can continue to operate when one of its main components fail






30. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing






31. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works






32. Ensure that transmitted information can be attributed to the named sender.






33. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.






34. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.






35. Should PRIMARILY be based on regulatory and legal requirements.






36. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.






37. Accesses a computer or network illegally






38. A risk assessment should be conducted _________________.






39. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information






40. Program that hides within or looks like a legit program






41. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.






42. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.






43. It is easier to manage and control a _________________.






44. Provides strong online authentication.






45. When the ________________ is more than the cost of the risk - the risk should be accepted.






46. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.






47. In order to highlight to management the importance of network security - the security manager should FIRST _______________.






48. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.






49. The data owner is responsible for _______________________.






50. Has full responsibility over data.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests