SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Transferred risk
Comparison of cost of achievement
Cost of control
Detection defenses
2. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Increase business value and confidence
Patch management
Notifications and opt-out provisions
Biometric access control systems
3. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Patch management process
Prioritization
Security awareness training for all employees
Negotiating a local version of the organization standards
4. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Classification of assets needs
Continuous monitoring control initiatives
Owner of the information asset
Its ability to reduce or eliminate business risks
5. The job of the information security officer on a management team is to ___________________.
Assess the risks to the business operation
Power surge/over voltage (spike)
The balanced scorecard
Cyber extortionist
6. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Notifications and opt-out provisions
Power surge/over voltage (spike)
Role-based access control
Identify the relevant systems and processes
7. Provide metrics to which outsourcing firms can be held accountable.
Service level agreements (SLAs)
Personal firewall
Control effectiveness
Platform security - intrusion detection and antivirus controls
8. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
The data owner
Knowledge management
BIA (Business Impact Assessment
Audit objectives
9. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Reduce risk to an acceptable level
Compliance with the organization's information security requirements
Risk assessment - evaluation and impact analysis
Consensus on risks and controls
10. Utility program that detects and protects a personal computer from unauthorized intrusions
Personal firewall
Countermeasure cost-benefit analysis
Cyber extortionist
Continuous monitoring control initiatives
11. The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is - ______________ would appear every time the user logs on - and the user would be required to read and agree
Transferred risk
Logon banners
Examples of containment defenses
Requirements of the data owners
12. An information security manager has to impress upon the human resources department the need for _____________________.
Digital certificate
Spoofing attacks
Background check
Security awareness training for all employees
13. Has full responsibility over data.
Calculating the value of the information or asset
The authentication process is broken
The data owner
The awareness and agreement of the data subjects
14. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
People
Digital signatures
Creation of a business continuity plan
Return on security investment (ROSI)
15. Only valid if assets have first been identified and appropriately valued.
Cost of control
Conduct a risk assessment
Annual loss expectancy (ALE)calculations
Decentralization
16. Oversees the overall classification management of the information.
The information security officer
Classification of assets needs
Encryption key management
Annually or whenever there is a significant change
17. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Detection defenses
Is willing to accept
Monitoring processes
18. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
IP address packet filtering
Alignment with business strategy
Process of introducing changes to systems
Examples of containment defenses
19. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Properly aligned with business goals and objectives
Data isolation
Identify the vulnerable systems and apply compensating controls
Requirements of the data owners
20. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Encryption
Lack of change management
Deeper level of analysis
Data owners
21. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Tie security risks to key business objectives
Control risk
Increase business value and confidence
Retention of business records
22. Legal document to be signed by all employees - suppliers etc before they 'touch' the organization - to protect the organization's intellectual property.
Undervoltage (brownout)
Knowledge management
Increase business value and confidence
Nondisclosure agreement (NDA)
23. A notice that guarantees a user or a web site is legitimate
Encryption of the hard disks
Digital certificate
Inherent risk
Data warehouse
24. Used to understand the flow of one process into another.
Platform security - intrusion detection and antivirus controls
Tie security risks to key business objectives
Centralized structure
Waterfall chart
25. The data owner is responsible for _______________________.
Requirements of the data owners
The database administrator
Compliance with the organization's information security requirements
Applying the proper classification to the data
26. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Virus
Residual risk
Owner of the information asset
Control effectiveness
27. A risk assessment should be conducted _________________.
Annually or whenever there is a significant change
Transmit e-mail messages
Identify the vulnerable systems and apply compensating controls
Worm
28. BEST option to improve accountability for a system administrator is to _____________________.
include security responsibilities in a job description
Negotiating a local version of the organization standards
IP address packet filtering
Proficiency testing
29. A function of the session keys distributed by the PKI.
Baseline standard and then develop additional standards
Regular review of access control lists
Phishing
Confidentiality
30. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Cyber extortionist
Owner of the information asset
Gain unauthorized access to applications
Retention of business records
31. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
The board of directors and senior management
Prioritization
Knowledge management
Requirements of the data owners
32. A key indicator of performance measurement.
Gap analysis
Nondisclosure agreement (NDA)
Strategic alignment of security with business objectives
Identify the vulnerable systems and apply compensating controls
33. When defining the information classification policy - the ___________________ need to be identified.
Requirements of the data owners
Regulatory compliance
Stress testing
Tailgating
34. Has to be integrated into the requirements of every software application's design.
Defined objectives
Resource dependency assessment
Encryption key management
Confidentiality
35. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Reduce risk to an acceptable level
Its ability to reduce or eliminate business risks
Methodology used in the assessment
Monitoring processes
36. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Get senior management onboard
Vulnerability assessment
Control effectiveness
Digital certificate
37. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Assess the risks to the business operation
Increase business value and confidence
Gain unauthorized access to applications
Key risk indicator (KRI) setup
38. The MOST important element of an information security strategy.
Worm
Defined objectives
Data classification
Safeguards over keys
39. Provides strong online authentication.
Spoofing attacks
Script kiddie
Encryption
Public key infrastructure (PKI)
40. Inject malformed input.
Undervoltage (brownout)
Aligned with organizational goals
Virus detection
Cross-site scripting attacks
41. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Security risk
Asset classification
SWOT analysis
Data owners
42. Occurs after the risk assessment process - it does not measure it.
Examples of containment defenses
Use of security metrics
Support the business objectives of the organization
Requirements of the data owners
43. Information security governance models are highly dependent on the _____________________.
Conduct a risk assessment
Overall organizational structure
Do with the information it collects
The information security officer
44. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Vulnerability assessment
Audit objectives
Spoofing attacks
All personnel
45. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Classification of assets needs
Risk appetite
Calculating the value of the information or asset
Regular review of access control lists
46. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Cyber terrorist
Internal risk assessment
Tie security risks to key business objectives
Single sign-on (SSO) product
47. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Virus detection
Impractical and is often cost-prohibitive
Two-factor authentication
Platform security - intrusion detection and antivirus controls
48. Whenever personal data are transferred across national boundaries; ________________________ are required.
The awareness and agreement of the data subjects
Control risk
Trojan horse
Is willing to accept
49. Would protect against spoofing an internal address but would not provide strong authentication.
Certificate authority (CA)
Security awareness training for all employees
Assess the risks to the business operation
IP address packet filtering
50. Uses security metrics to measure the performance of the information security program.
Information security manager
Biometric access control systems
Transmit e-mail messages
Negotiating a local version of the organization standards