SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Has full responsibility over data.
The information security officer
The data owner
Data mart
Normalization
2. Only valid if assets have first been identified and appropriately valued.
Assess the risks to the business operation
Annual loss expectancy (ALE)calculations
All personnel
Do with the information it collects
3. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
The database administrator
Aligned with organizational goals
Worm
Skills inventory
4. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Logon banners
Single sign-on (SSO) product
Key controls
Security risk
5. By definition are not previously known and therefore are undetectable.
Data isolation
Owner of the information asset
0-day vulnerabilities
Single sign-on (SSO) product
6. Responsible for securing the information.
Decentralization
The data custodian
Do with the information it collects
Consensus on risks and controls
7. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Impractical and is often cost-prohibitive
Identify the vulnerable systems and apply compensating controls
Security awareness training for all employees
Background checks of prospective employees
8. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Attributes and characteristics of the 'desired state'
Centralized structure
Risk assessment - evaluation and impact analysis
Do with the information it collects
9. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Threat assessment
Cross-site scripting attacks
Platform security - intrusion detection and antivirus controls
Defining high-level business security requirements
10. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Monitoring processes
Return on security investment (ROSI)
Cyber extortionist
Patch management process
11. Identification and _______________ of business risk enables project managers to address areas with most significance.
Intrusion detection system (IDS)
Notifications and opt-out provisions
Waterfall chart
Prioritization
12. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Encryption key management
Tailgating
Process of introducing changes to systems
Phishing
13. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. Provide metrics to which outsourcing firms can be held accountable.
Service level agreements (SLAs)
OBusiness case development
Skills inventory
Safeguards over keys
15. Provides strong online authentication.
Baseline standard and then develop additional standards
Public key infrastructure (PKI)
Cost of control
Key controls
16. Computer that has duplicate components so it can continue to operate when one of its main components fail
Identify the relevant systems and processes
Fault-tolerant computer
Annually or whenever there is a significant change
Aligned with organizational goals
17. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
People
Virus detection
Threat assessment
Access control matrix
18. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Support the business objectives of the organization
Vulnerability assessment
Decentralization
Cracker
19. Should PRIMARILY be based on regulatory and legal requirements.
Defining high-level business security requirements
Well-defined roles and responsibilities
Retention of business records
Gap analysis
20. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Service level agreements (SLAs)
BIA (Business Impact Assessment
Waterfall chart
Background checks of prospective employees
21. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Data owners
Continuous monitoring control initiatives
Notifications and opt-out provisions
Residual risk would be reduced by a greater amount
22. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Hacker
Role-based policy
Detection defenses
Waterfall chart
23. New security ulnerabilities should be managed through a ________________.
Deeper level of analysis
Patch management process
Equal error rate (EER)
MAL wear
24. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Annual loss expectancy (ALE)calculations
Regular review of access control lists
Patch management
Background checks of prospective employees
25. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Methodology used in the assessment
Conduct a risk assessment
Creation of a business continuity plan
The balanced scorecard
26. Would protect against spoofing an internal address but would not provide strong authentication.
Residual risk would be reduced by a greater amount
IP address packet filtering
Script kiddie
Digital signatures
27. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Security baselines
Resource dependency assessment
Cross-site scripting attacks
Data mart
28. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Risk appetite
Regular review of access control lists
Information security manager
Data owners
29. The PRIMARY goal in developing an information security strategy is to: _________________________.
Continuous monitoring control initiatives
Proficiency testing
The awareness and agreement of the data subjects
Support the business objectives of the organization
30. Carries out the technical administration.
The database administrator
Strategic alignment of security with business objectives
Lack of change management
All personnel
31. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Security risk
Deeper level of analysis
Annual loss expectancy (ALE)calculations
Transferred risk
32. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Public key infrastructure (PKI)
Increase business value and confidence
Cryptographic secure sockets layer (SSL) implementations and short key lengths
A network vulnerability assessment
33. Should be determined from the risk assessment results.
Exceptions to policy
Defined objectives
Audit objectives
Residual risk would be reduced by a greater amount
34. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Get senior management onboard
Conduct a risk assessment
Encryption of the hard disks
Malicious software and spyware
35. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
MAL wear
Decentralization
Residual risk would be reduced by a greater amount
The board of directors and senior management
36. In order to highlight to management the importance of network security - the security manager should FIRST _______________.
Fault-tolerant computer
Background check
Conduct a risk assessment
Digital signatures
37. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Inherent risk
Encryption
Notifications and opt-out provisions
SWOT analysis
38. A key indicator of performance measurement.
Data classification
Strategic alignment of security with business objectives
Audit objectives
People
39. Occurs after the risk assessment process - it does not measure it.
Use of security metrics
Single sign-on (SSO) product
Power surge/over voltage (spike)
Continuous analysis - monitoring and feedback
40. Provides process needs but not impact.
Waterfall chart
Its ability to reduce or eliminate business risks
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Resource dependency assessment
41. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Owner of the information asset
Security risk
Defined objectives
Service level agreements (SLAs)
42. Normally addressed through antivirus and antispyware policies.
Malicious software and spyware
Annual loss expectancy (ALE)calculations
Digital signatures
Owner of the information asset
43. When the ________________ is more than the cost of the risk - the risk should be accepted.
Deeper level of analysis
Fault-tolerant computer
Cost of control
Key risk indicator (KRI) setup
44. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Performing a risk assessment
Gap analysis
Confidentiality
Defining and ratifying the classification structure of information assets
45. ecurity design flaws require a ____________________.
Safeguards over keys
Asset classification
Biometric access control systems
Deeper level of analysis
46. Most effective for evaluating the degree to which information security objectives are being met.
Proficiency testing
Logon banners
The balanced scorecard
Tailgating
47. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Worm
Centralized structure
Use of security metrics
48. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Risk assessment - evaluation and impact analysis
Rule-based access control
MAL wear
Negotiating a local version of the organization standards
49. Should be performed to identify the risk and determine needed controls.
Fault-tolerant computer
Well-defined roles and responsibilities
Annually or whenever there is a significant change
Internal risk assessment
50. BEST option to improve accountability for a system administrator is to _____________________.
include security responsibilities in a job description
Biometric access control systems
Detection defenses
Prioritization
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests