SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
OBusiness case development
Digital certificate
Skills inventory
Data mart
2. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Control effectiveness
Decentralization
Control risk
Cyber terrorist
3. Focuses on identifying vulnerabilities.
Total cost of ownership (TCO)
Penetration testing
Cracker
Vulnerability assessment
4. Should be performed to identify the risk and determine needed controls.
Control risk
Patch management
Gain unauthorized access to applications
Internal risk assessment
5. Normally addressed through antivirus and antispyware policies.
Cross-site scripting attacks
Malicious software and spyware
Hacker
Security baselines
6. A method for analyzing and reducing a relational database to its most streamlined form
Exceptions to policy
Rule-based access control
Protective switch covers
Normalization
7. BEST option to improve accountability for a system administrator is to _____________________.
Security awareness training for all employees
include security responsibilities in a job description
Requirements of the data owners
Stress testing
8. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
BIA (Business Impact Assessment
The database administrator
Residual risk would be reduced by a greater amount
Breakeven point of risk reduction and cost
9. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Acceptable use policies
Background checks of prospective employees
Asset classification
Key controls
10. Provides an additional security mechanism over and above that provided by passwords alone. This is frequently used by mobile users needing to establish connectivity to a corporate network.
Security risk
Virus detection
Retention of business records
Two-factor authentication
11. Primarily reduce risk and are most effective for the protection of information assets.
Audit objectives
Key controls
Tie security risks to key business objectives
Risk appetite
12. Should PRIMARILY be based on regulatory and legal requirements.
Do with the information it collects
Breakeven point of risk reduction and cost
The database administrator
Retention of business records
13. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
Two-factor authentication
Background checks of prospective employees
Return on security investment (ROSI)
Data isolation
14. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Single sign-on (SSO) product
Protective switch covers
Resource dependency assessment
Skills inventory
15. Computer that has duplicate components so it can continue to operate when one of its main components fail
Fault-tolerant computer
Centralized structure
Tailgating
Impractical and is often cost-prohibitive
16. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Identify the relevant systems and processes
Impractical and is often cost-prohibitive
Normalization
Performing a risk assessment
17. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Gain unauthorized access to applications
Nondisclosure agreement (NDA)
Support the business objectives of the organization
Power surge/over voltage (spike)
18. ecurity design flaws require a ____________________.
Deeper level of analysis
Gap analysis
Residual risk
Two-factor authentication
19. Would protect against spoofing an internal address but would not provide strong authentication.
Two-factor authentication
IP address packet filtering
Background check
The data owner
20. A key indicator of performance measurement.
Role-based access control
BIA (Business Impact Assessment
Strategic alignment of security with business objectives
Vulnerability assessment
21. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Impractical and is often cost-prohibitive
Baseline standard and then develop additional standards
Creation of a business continuity plan
Fault-tolerant computer
22. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Background check
Identify the vulnerable systems and apply compensating controls
The data owner
Risk assessment - evaluation and impact analysis
23. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Cost of control
Inherent risk
Increase business value and confidence
Is willing to accept
24. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Is willing to accept
Data isolation
Its ability to reduce or eliminate business risks
Properly aligned with business goals and objectives
25. It is easier to manage and control a _________________.
Centralized structure
Malicious software and spyware
Consensus on risks and controls
Cost of control
26. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Control effectiveness
Detection defenses
Cross-site scripting attacks
Proficiency testing
27. Cannot be minimized
Inherent risk
Virus
Virus detection
Penetration testing
28. Someone who uses the internet or network to destroy or damage computers for political reasons
Use of security metrics
Logon banners
Cyber terrorist
Overall organizational structure
29. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Intrusion detection system (IDS)
SWOT analysis
The data custodian
Digital certificate
30. Applications cannot access data associated with other apps
Data isolation
Tailgating
Role-based policy
Cross-site scripting attacks
31. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Spoofing attacks
Developing an information security baseline
Overall organizational structure
Countermeasure cost-benefit analysis
32. Useful but only with regard to specific technical skills.
Data isolation
Residual risk
Proficiency testing
The balanced scorecard
33. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Role-based policy
Audit objectives
Use of security metrics
Detection defenses
34. Has to be integrated into the requirements of every software application's design.
Fault-tolerant computer
Encryption key management
Cost of control
Cyber terrorist
35. The information security manager needs to prioritize the controls based on ________________________.
Risk assessment - evaluation and impact analysis
Support the business objectives of the organization
Risk management and the requirements of the organization
Trojan horse
36. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
Digital certificate
Security awareness training for all employees
SWOT analysis
The authentication process is broken
37. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Deeper level of analysis
Continuous monitoring control initiatives
Impractical and is often cost-prohibitive
The awareness and agreement of the data subjects
38. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Cracker
The board of directors and senior management
Use of security metrics
Countermeasure cost-benefit analysis
39. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Data owners
Well-defined roles and responsibilities
Gap analysis
Cryptographic secure sockets layer (SSL) implementations and short key lengths
40. Provides process needs but not impact.
Resource dependency assessment
Increase business value and confidence
Key risk indicator (KRI) setup
0-day vulnerabilities
41. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Virus detection
Phishing
Properly aligned with business goals and objectives
Certificate authority (CA)
42. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Strategic alignment of security with business objectives
Comparison of cost of achievement
Regulatory compliance
Its ability to reduce or eliminate business risks
43. Someone who accesses a computer or network illegally
Owner of the information asset
Hacker
Acceptable use policies
Impractical and is often cost-prohibitive
44. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Process of introducing changes to systems
Safeguards over keys
Total cost of ownership (TCO)
Data isolation
45. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Key risk indicator (KRI) setup
Gain unauthorized access to applications
Classification of assets needs
Data classification
46. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. Should be determined from the risk assessment results.
Conduct a risk assessment
Methodology used in the assessment
Audit objectives
All personnel
48. The MOST important element of an information security strategy.
Defined objectives
Negotiating a local version of the organization standards
Risk assessment - evaluation and impact analysis
Audit objectives
49. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Its ability to reduce or eliminate business risks
Use of security metrics
Get senior management onboard
OBusiness case development
50. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Nondisclosure agreement (NDA)
Data mart
Notifications and opt-out provisions
Methodology used in the assessment