SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Notifications and opt-out provisions
Developing an information security baseline
The board of directors and senior management
Regular review of access control lists
2. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Role-based policy
Public key infrastructure (PKI)
BIA (Business Impact Assessment
Data mart
3. Focuses on identifying vulnerabilities.
Penetration testing
Regular review of access control lists
Monitoring processes
Normalization
4. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Data warehouse
Deeper level of analysis
Normalization
Patch management
5. Uses security metrics to measure the performance of the information security program.
The board of directors and senior management
Tailgating
Information security manager
Centralized structure
6. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Classification of assets needs
Data mart
Encryption of the hard disks
MAL wear
7. Awareness - training and physical security defenses.
Cyber terrorist
Personal firewall
Applying the proper classification to the data
Examples of containment defenses
8. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Attributes and characteristics of the 'desired state'
Residual risk would be reduced by a greater amount
Deeper level of analysis
Cross-site scripting attacks
9. ecurity design flaws require a ____________________.
Deeper level of analysis
Protective switch covers
Calculating the value of the information or asset
Knowledge management
10. S small warehouse - designed for the end-user needs in a strategic business unit
Attributes and characteristics of the 'desired state'
Annual loss expectancy (ALE)calculations
Data mart
Creation of a business continuity plan
11. A risk assessment should be conducted _________________.
Monitoring processes
Annually or whenever there is a significant change
Risk appetite
Patch management process
12. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Security awareness training for all employees
Calculating the value of the information or asset
Asset classification
Monitoring processes
13. The data owner is responsible for _______________________.
Data classification
Hacker
Vulnerability assessment
Applying the proper classification to the data
14. Primarily reduce risk and are most effective for the protection of information assets.
Single sign-on (SSO) product
Key controls
Strategic alignment of security with business objectives
The balanced scorecard
15. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Transmit e-mail messages
Encryption
Safeguards over keys
Assess the risks to the business operation
16. provides the most effective protection of data on mobile devices.
Patch management
Impractical and is often cost-prohibitive
Encryption
IP address packet filtering
17. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Attributes and characteristics of the 'desired state'
Protective switch covers
Certificate authority (CA)
Access control matrix
18. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Logon banners
The board of directors and senior management
Worm
Developing an information security baseline
19. A key indicator of performance measurement.
Access control matrix
Decentralization
Strategic alignment of security with business objectives
Trusted source
20. When defining the information classification policy - the ___________________ need to be identified.
Get senior management onboard
Undervoltage (brownout)
Cost of control
Requirements of the data owners
21. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Comparison of cost of achievement
Intrusion detection system (IDS)
Process of introducing changes to systems
Vulnerability assessment
22. A notice that guarantees a user or a web site is legitimate
Digital certificate
Identify the vulnerable systems and apply compensating controls
Rule-based access control
Hacker
23. Attackers who exploit weak application authentication controls can ___________________ and this has little to do with cross-site scripting vulnerabilities.
Tie security risks to key business objectives
Patch management
Gain unauthorized access to applications
The board of directors and senior management
24. Accesses a computer or network illegally
Platform security - intrusion detection and antivirus controls
Background check
The authentication process is broken
Cracker
25. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
All personnel
Phishing
Notifications and opt-out provisions
Overall organizational structure
26. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Defining high-level business security requirements
People
Breakeven point of risk reduction and cost
Get senior management onboard
27. Cannot be minimized
MAL wear
Cost of control
Assess the risks to the business operation
Inherent risk
28. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Virus
Baseline standard and then develop additional standards
Continuous analysis - monitoring and feedback
Service level agreements (SLAs)
29. When the ________________ is more than the cost of the risk - the risk should be accepted.
Stress testing
Cost of control
Asset classification
0-day vulnerabilities
30. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Encryption
Vulnerability assessment
Baseline standard and then develop additional standards
Single sign-on (SSO) product
31. Most effective for evaluating the degree to which information security objectives are being met.
Support the business objectives of the organization
Impractical and is often cost-prohibitive
The balanced scorecard
Cost of control
32. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Performing a risk assessment
Virus detection
All personnel
Personal firewall
33. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
The board of directors and senior management
What happened and how the breach was resolved
Identify the relevant systems and processes
Information contained on the equipment
34. A Successful risk management should lead to a ________________.
Alignment with business strategy
Breakeven point of risk reduction and cost
Control effectiveness
Retention of business records
35. Occurs when the electrical supply drops
Attributes and characteristics of the 'desired state'
Logon banners
Undervoltage (brownout)
Single sign-on (SSO) product
36. Oversees the overall classification management of the information.
Encryption of the hard disks
Safeguards over keys
The information security officer
The database administrator
37. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
A network vulnerability assessment
Risk appetite
Logon banners
38. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
Data mart
Total cost of ownership (TCO)
Impractical and is often cost-prohibitive
39. Inject malformed input.
Deeper level of analysis
Cross-site scripting attacks
Identify the relevant systems and processes
Worm
40. Without _____________________ - there cannot be accountability.
Nondisclosure agreement (NDA)
Annually or whenever there is a significant change
Breakeven point of risk reduction and cost
Well-defined roles and responsibilities
41. Reducing risk to a level too small to measure is _______________.
Do with the information it collects
Impractical and is often cost-prohibitive
Two-factor authentication
The board of directors and senior management
42. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Protective switch covers
Transmit e-mail messages
Detection defenses
The board of directors and senior management
43. When developing an information security program _________________ would help identify the available resources - any gaps and the training requirements for developing resources.
BIA (Business Impact Assessment
Skills inventory
Two-factor authentication
Residual risk would be reduced by a greater amount
44. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
Penetration testing
The awareness and agreement of the data subjects
Key controls
45. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Calculating the value of the information or asset
Identify the relevant systems and processes
Residual risk would be reduced by a greater amount
Encryption of the hard disks
46. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Risk assessment - evaluation and impact analysis
Rule-based access control
Decentralization
Risk appetite
47. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Return on security investment (ROSI)
OBusiness case development
Impractical and is often cost-prohibitive
Identify the vulnerable systems and apply compensating controls
48. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Transferred risk
Continuous monitoring control initiatives
The board of directors and senior management
Assess the risks to the business operation
49. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Key risk indicator (KRI) setup
Information contained on the equipment
Security awareness training for all employees
Role-based policy
50. Would protect against spoofing an internal address but would not provide strong authentication.
All personnel
Penetration testing
Assess the risks to the business operation
IP address packet filtering