SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information
Logon banners
Data isolation
Phishing
Reduce risk to an acceptable level
2. The MOST important element of an information security strategy.
Security risk
All personnel
Defined objectives
Malicious software and spyware
3. A risk assessment should be conducted _________________.
Strategic alignment of security with business objectives
Trojan horse
Annually or whenever there is a significant change
Platform security - intrusion detection and antivirus controls
4. Warranted in circumstances where compliance may be difficult or impossible and the risk of noncompliance is outweighed by the benefits.
The awareness and agreement of the data subjects
Safeguards over keys
Role-based access control
Exceptions to policy
5. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Digital certificate
Hacker
Exceptions to policy
Its ability to reduce or eliminate business risks
6. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Audit objectives
Cracker
Trojan horse
Asset classification
7. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Monitoring processes
Risk appetite
Annual loss expectancy (ALE)calculations
Knowledge management
8. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Data mart
Transferred risk
Threat assessment
Risk management and the requirements of the organization
9. Change management controls the _____________________. This is often the point at which a weakness will be introduced.
Protective switch covers
Process of introducing changes to systems
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Identify the relevant systems and processes
10. To identify known vulnerabilities based on common misconfigurations and missing updates.
Annually or whenever there is a significant change
Script kiddie
A network vulnerability assessment
Access control matrix
11. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Comparison of cost of achievement
Fault-tolerant computer
0-day vulnerabilities
Aligned with organizational goals
12. Someone who accesses a computer or network illegally
Cracker
Residual risk would be reduced by a greater amount
Virus detection
Hacker
13. Useful but only with regard to specific technical skills.
Process of introducing changes to systems
Proficiency testing
Negotiating a local version of the organization standards
The balanced scorecard
14. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Residual risk
Information contained on the equipment
Nondisclosure agreement (NDA)
Is willing to accept
15. A notice that guarantees a user or a web site is legitimate
Multinational organization
Security code reviews for the entire software application
Digital certificate
The board of directors and senior management
16. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Control risk
Data isolation
Biometric access control systems
Applying the proper classification to the data
17. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Background checks of prospective employees
Digital signatures
Reduce risk to an acceptable level
Prioritization
18. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Annual loss expectancy (ALE)calculations
Increase business value and confidence
Spoofing attacks
Get senior management onboard
19. Has to be integrated into the requirements of every software application's design.
Encryption key management
Asset classification
The data custodian
Decentralization
20. Can be a standalone driver for an information security governance measure. No further analysis nor justification is required since the entity has no choice in the regulatory requirements.
Regulatory compliance
IP address packet filtering
Background checks of prospective employees
Cryptographic secure sockets layer (SSL) implementations and short key lengths
21. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Classification of assets needs
Decentralization
Negotiating a local version of the organization standards
Protective switch covers
22. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Rule-based access control
Digital certificate
Inherent risk
Virus detection
23. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
Control effectiveness
Patch management
The data custodian
25. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Knowledge management
The awareness and agreement of the data subjects
Defining high-level business security requirements
Residual risk would be reduced by a greater amount
26. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Vulnerability assessment
Undervoltage (brownout)
Cross-site scripting attacks
Cost of control
27. The job of the information security officer on a management team is to ___________________.
Assess the risks to the business operation
Two-factor authentication
Continuous monitoring control initiatives
Attributes and characteristics of the 'desired state'
28. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Monitoring processes
Developing an information security baseline
BIA (Business Impact Assessment
Intrusion detection system (IDS)
29. A method for analyzing and reducing a relational database to its most streamlined form
Owner of the information asset
Monitoring processes
Safeguards over keys
Normalization
30. Occurs when the electrical supply drops
Confidentiality
Worm
Creation of a business continuity plan
Undervoltage (brownout)
31. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Role-based policy
Cyber extortionist
Cost of control
The information security officer
32. A repository of historical data organized by subject to support decision makers in the org
Alignment with business strategy
Internal risk assessment
The database administrator
Data warehouse
33. Ensure that transmitted information can be attributed to the named sender.
Platform security - intrusion detection and antivirus controls
Digital signatures
Audit objectives
Spoofing attacks
34. New security ulnerabilities should be managed through a ________________.
Role-based policy
Regular review of access control lists
Patch management process
Hacker
35. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
Identify the vulnerable systems and apply compensating controls
Encryption key management
Cost of control
Methodology used in the assessment
36. Used to understand the flow of one process into another.
Waterfall chart
Total cost of ownership (TCO)
Prioritization
Script kiddie
37. Cannot be minimized
Consensus on risks and controls
Inherent risk
Single sign-on (SSO) product
0-day vulnerabilities
38. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Data classification
Is willing to accept
Penetration testing
Information contained on the equipment
39. Most effective for evaluating the degree to which information security objectives are being met.
Penetration testing
Encryption key management
The balanced scorecard
include security responsibilities in a job description
40. All within the responsibility of the information security manager.
Alignment with business strategy
Tailgating
Platform security - intrusion detection and antivirus controls
Security baselines
41. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Rule-based access control
Get senior management onboard
Security risk
Conduct a risk assessment
42. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Decentralization
Regular review of access control lists
Owner of the information asset
Phishing
43. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Increase business value and confidence
The authentication process is broken
Risk management and the requirements of the organization
Internal risk assessment
44. Occurs when the incoming level
Return on security investment (ROSI)
Power surge/over voltage (spike)
Creation of a business continuity plan
The balanced scorecard
45. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Waterfall chart
Detection defenses
Trusted source
Regulatory compliance
46. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Risk appetite
Spoofing attacks
Encryption key management
Cryptographic secure sockets layer (SSL) implementations and short key lengths
47. btaining senior management support for establishing a warm site can BEST be accomplished by ____________________ - including a cost-benefit analysis - will be most persuasive to management. A risk assessment may be included in the business case - but
OBusiness case development
Multinational organization
Public key infrastructure (PKI)
Access control matrix
48. Computer that has duplicate components so it can continue to operate when one of its main components fail
Annually or whenever there is a significant change
Vulnerability assessment
Fault-tolerant computer
Cyber terrorist
49. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
Gap analysis
Exceptions to policy
Phishing
50. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Baseline standard and then develop additional standards
Gap analysis
Process of introducing changes to systems
Continuous analysis - monitoring and feedback