SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Internal risk assessment
The awareness and agreement of the data subjects
Centralized structure
Residual risk
2. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
Rule-based access control
Undervoltage (brownout)
Do with the information it collects
Exceptions to policy
3. The most important characteristic of good security policies is that they be ____________________.
Control risk
A network vulnerability assessment
People
Aligned with organizational goals
4. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Biometric access control systems
Tailgating
Information security manager
Logon banners
5. Someone who uses the internet or network to destroy or damage computers for political reasons
Background checks of prospective employees
Performing a risk assessment
Cyber terrorist
Control effectiveness
6. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Hacker
Do with the information it collects
Key controls
Performing a risk assessment
7. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Normalization
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Continuous monitoring control initiatives
Security baselines
8. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Continuous analysis - monitoring and feedback
Calculating the value of the information or asset
Annual loss expectancy (ALE)calculations
Negotiating a local version of the organization standards
9. Should be determined from the risk assessment results.
Reduce risk to an acceptable level
Impractical and is often cost-prohibitive
Audit objectives
Phishing
10. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Continuous analysis - monitoring and feedback
Safeguards over keys
Tailgating
Aligned with organizational goals
11. The _____________________is a severe omission and will greatly increase information security risk. Presents the GREATEST information security risk for an organization with multiple - but small - domestic processing locations
Lack of change management
Regular review of access control lists
Prioritization
Notifications and opt-out provisions
12. A method for analyzing and reducing a relational database to its most streamlined form
Gap analysis
Normalization
Digital certificate
Role-based access control
13. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. It means _____________.
The authentication process is broken
Retention of business records
The data owner
Transmit e-mail messages
14. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Confidentiality
Public key infrastructure (PKI)
Get senior management onboard
Comparison of cost of achievement
15. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Retention of business records
Decentralization
The awareness and agreement of the data subjects
Attributes and characteristics of the 'desired state'
16. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. Should be performed to identify the risk and determine needed controls.
Multinational organization
Inherent risk
Return on security investment (ROSI)
Internal risk assessment
18. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Safeguards over keys
What happened and how the breach was resolved
Patch management process
Total cost of ownership (TCO)
19. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Defined objectives
Background checks of prospective employees
Use of security metrics
Lack of change management
20. Program that hides within or looks like a legit program
Knowledge management
Trojan horse
Security baselines
Do with the information it collects
21. Responsible for securing the information.
Cracker
The data custodian
Rule-based access control
Comparison of cost of achievement
22. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Script kiddie
Retention of business records
Get senior management onboard
Information contained on the equipment
23. Ultimately responsible for all that happens in the organization. The others are not individually liable for failures of security in the organization.
Defining high-level business security requirements
Calculating the value of the information or asset
Cracker
The board of directors and senior management
24. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Virus detection
Intrusion detection system (IDS)
All personnel
0-day vulnerabilities
25. When defining the information classification policy - the ___________________ need to be identified.
Regular review of access control lists
Requirements of the data owners
Data classification
Exceptions to policy
26. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Data mart
Audit objectives
Comparison of cost of achievement
Virus detection
27. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Continuous monitoring control initiatives
Reduce risk to an acceptable level
Performing a risk assessment
The authentication process is broken
28. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Access control matrix
Acceptable use policies
Centralization of information security management
Examples of containment defenses
29. A repository of historical data organized by subject to support decision makers in the org
Data warehouse
Service level agreements (SLAs)
Classification of assets needs
Monitoring processes
30. Someone who accesses a computer or network illegally
Defining and ratifying the classification structure of information assets
Equal error rate (EER)
include security responsibilities in a job description
Hacker
31. Requires a process to verify that the control process worked as intended. Examples such as dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
Decentralization
Vulnerability assessment
Control effectiveness
The balanced scorecard
32. Oversees the overall classification management of the information.
The information security officer
Aligned with organizational goals
Classification of assets needs
Deeper level of analysis
33. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Virus
Lack of change management
Safeguards over keys
Data warehouse
34. The PRIMARY goal in developing an information security strategy is to: _________________________.
Support the business objectives of the organization
Information contained on the equipment
Continuous analysis - monitoring and feedback
Logon banners
35. Same intent as a cracker but does not have the technical skills and knowledge
Developing an information security baseline
Platform security - intrusion detection and antivirus controls
Script kiddie
Trojan horse
36. Occurs when the incoming level
Transferred risk
Power surge/over voltage (spike)
Countermeasure cost-benefit analysis
Attributes and characteristics of the 'desired state'
37. Provide metrics to which outsourcing firms can be held accountable.
Owner of the information asset
Service level agreements (SLAs)
Control effectiveness
Increase business value and confidence
38. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Process of introducing changes to systems
Defined objectives
Annually or whenever there is a significant change
The database administrator
39. Should PRIMARILY be based on regulatory and legal requirements.
Data owners
Cyber terrorist
Retention of business records
Exceptions to policy
40. The primary role of the information security manager in the process of information classification within the organization.
Waterfall chart
Audit objectives
Defining and ratifying the classification structure of information assets
Nondisclosure agreement (NDA)
41. Useful but only with regard to specific technical skills.
Proficiency testing
Internal risk assessment
Control risk
The authentication process is broken
42. Risk should be reduced to a level that an organization _____________.
Is willing to accept
Aligned with organizational goals
Cracker
Phishing
43. Ensures that there are no scalability problems.
Equal error rate (EER)
Stress testing
Aligned with organizational goals
Defining and ratifying the classification structure of information assets
44. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
Worm
Information contained on the equipment
Role-based access control
People
45. Focuses on identifying vulnerabilities.
Two-factor authentication
Undervoltage (brownout)
Penetration testing
Internal risk assessment
46. A Successful risk management should lead to a ________________.
Breakeven point of risk reduction and cost
Data owners
Access control matrix
Background checks of prospective employees
47. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Undervoltage (brownout)
Phishing
0-day vulnerabilities
IP address packet filtering
48. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Assess the risks to the business operation
Aligned with organizational goals
Vulnerability assessment
The board of directors and senior management
49. Needs to define the access rules - which is troublesome and error prone in large organizations.
Cross-site scripting attacks
Strategic alignment of security with business objectives
Rule-based access control
Transmit e-mail messages
50. The job of the information security officer on a management team is to ___________________.
The information security officer
Security awareness training for all employees
Assess the risks to the business operation
Certificate authority (CA)