SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Inject malformed input.
MAL wear
Security awareness training for all employees
Cross-site scripting attacks
The data owner
2. An information security manager has to impress upon the human resources department the need for _____________________.
Security awareness training for all employees
Malicious software and spyware
Encryption of the hard disks
Virus detection
3. Responsible for securing the information.
Worm
The data custodian
Security baselines
Fault-tolerant computer
4. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
Decentralization
Asset classification
Exceptions to policy
5. Accesses a computer or network illegally
Reduce risk to an acceptable level
Cracker
Retention of business records
The balanced scorecard
6. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Normalization
Data isolation
Data warehouse
Identify the vulnerable systems and apply compensating controls
7. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Spoofing attacks
Multinational organization
Certificate authority (CA)
Key risk indicator (KRI) setup
8. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Data warehouse
Residual risk
Impractical and is often cost-prohibitive
Negotiating a local version of the organization standards
9. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Data classification
Cyber terrorist
Logon banners
Consensus on risks and controls
10. Program that hides within or looks like a legit program
Encryption of the hard disks
Requirements of the data owners
MAL wear
Trojan horse
11. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
The board of directors and senior management
Residual risk would be reduced by a greater amount
include security responsibilities in a job description
Alignment with business strategy
12. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
OBusiness case development
Penetration testing
People
include security responsibilities in a job description
13. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Defined objectives
Key controls
Role-based policy
14. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Continuous monitoring control initiatives
Assess the risks to the business operation
Security code reviews for the entire software application
Breakeven point of risk reduction and cost
15. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Decentralization
Security risk
The balanced scorecard
Process of introducing changes to systems
16. Should be determined from the risk assessment results.
IP address packet filtering
Security code reviews for the entire software application
Total cost of ownership (TCO)
Audit objectives
17. Company or person you believe will not send a virus-infect file knowingly
Cost of control
Trusted source
BIA (Business Impact Assessment
The authentication process is broken
18. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Centralization of information security management
Digital certificate
Compliance with the organization's information security requirements
Regulatory compliance
19. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
The awareness and agreement of the data subjects
Confidentiality
The authentication process is broken
OBusiness case development
20. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Identify the vulnerable systems and apply compensating controls
Defining high-level business security requirements
Monitoring processes
Is willing to accept
21. Ensure that transmitted information can be attributed to the named sender.
Digital signatures
Return on security investment (ROSI)
Retention of business records
Proficiency testing
22. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
Risk assessment - evaluation and impact analysis
Exceptions to policy
include security responsibilities in a job description
What happened and how the breach was resolved
23. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. It is more efficient to establish a ___________________for locations that must meet specific requirements.
The data custodian
Baseline standard and then develop additional standards
Defining high-level business security requirements
Acceptable use policies
25. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Comparison of cost of achievement
include security responsibilities in a job description
Acceptable use policies
Identify the relevant systems and processes
26. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Fault-tolerant computer
Negotiating a local version of the organization standards
Return on security investment (ROSI)
Phishing
27. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Background checks of prospective employees
Classification of assets needs
Intrusion detection system (IDS)
Cyber terrorist
28. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Waterfall chart
Gap analysis
Two-factor authentication
Requirements of the data owners
29. provides the most effective protection of data on mobile devices.
Centralized structure
Malicious software and spyware
Acceptable use policies
Encryption
30. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Data owners
Power surge/over voltage (spike)
Information contained on the equipment
Deeper level of analysis
31. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Defining and ratifying the classification structure of information assets
Virus detection
Security risk
Developing an information security baseline
32. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
Cracker
Key controls
Internal risk assessment
33. Culture has a significant impact on how information security will be implemented in a ______________________.
MAL wear
Exceptions to policy
Multinational organization
Digital signatures
34. Has to be integrated into the requirements of every software application's design.
Tie security risks to key business objectives
Monitoring processes
Encryption key management
IP address packet filtering
35. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Intrusion detection system (IDS)
Asset classification
Classification of assets needs
Confidentiality
36. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Acceptable use policies
MAL wear
Data mart
Do with the information it collects
37. The information security manager needs to prioritize the controls based on ________________________.
Hacker
Data owners
Script kiddie
Risk management and the requirements of the organization
38. Provides process needs but not impact.
Countermeasure cost-benefit analysis
Two-factor authentication
Fault-tolerant computer
Resource dependency assessment
39. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
Is willing to accept
Its ability to reduce or eliminate business risks
Continuous monitoring control initiatives
40. Risk should be reduced to a level that an organization _____________.
Is willing to accept
Return on security investment (ROSI)
Comparison of cost of achievement
The board of directors and senior management
41. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Risk appetite
Public key infrastructure (PKI)
Vulnerability assessment
Comparison of cost of achievement
42. Ensures that there are no scalability problems.
Continuous analysis - monitoring and feedback
Stress testing
Total cost of ownership (TCO)
Power surge/over voltage (spike)
43. Primarily reduce risk and are most effective for the protection of information assets.
Get senior management onboard
Key controls
Threat assessment
Countermeasure cost-benefit analysis
44. The most important characteristic of good security policies is that they be ____________________.
Aligned with organizational goals
Requirements of the data owners
Countermeasure cost-benefit analysis
OBusiness case development
45. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Confidentiality
People
Rule-based access control
Encryption key management
46. Provides strong online authentication.
Regular review of access control lists
Public key infrastructure (PKI)
People
Proficiency testing
47. Oversees the overall classification management of the information.
Strategic alignment of security with business objectives
The information security officer
Cracker
IP address packet filtering
48. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Hacker
Annual loss expectancy (ALE)calculations
Continuous monitoring control initiatives
Role-based access control
49. Reducing risk to a level too small to measure is _______________.
Risk assessment - evaluation and impact analysis
Cyber terrorist
Impractical and is often cost-prohibitive
Continuous monitoring control initiatives
50. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Cracker
Control risk
The information security officer
Annually or whenever there is a significant change