SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The BEST way to justify the implementation of a _____________________ is to use a business case. Return on investment (ROI) would only provide the costs needed to preclude specific risks - and would not provide other indirect benefits such as process
Monitoring processes
BIA (Business Impact Assessment
Single sign-on (SSO) product
The balanced scorecard
2. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Key controls
Knowledge management
Public key infrastructure (PKI)
Monitoring processes
3. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Identify the relevant systems and processes
Exceptions to policy
Get senior management onboard
Is willing to accept
4. When defining the information classification policy - the ___________________ need to be identified.
Is willing to accept
Decentralization
Methodology used in the assessment
Requirements of the data owners
5. Same intent as a cracker but does not have the technical skills and knowledge
Skills inventory
Overall organizational structure
Risk appetite
Script kiddie
6. By definition are not previously known and therefore are undetectable.
Worm
0-day vulnerabilities
Residual risk would be reduced by a greater amount
Service level agreements (SLAs)
7. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Safeguards over keys
All personnel
Increase business value and confidence
Background check
8. Information security architecture should always be _______________________. Alignment with IT plans or industry and security best practices is secondary by comparison.
Defining high-level business security requirements
Notifications and opt-out provisions
Properly aligned with business goals and objectives
Confidentiality
9. Any event or action that could cause a loss of or damage to computer hardware - software - data - information - or processing capability
Cyber terrorist
Security risk
Spoofing attacks
Asset classification
10. New security ulnerabilities should be managed through a ________________.
Acceptable use policies
Patch management process
Phishing
Data mart
11. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Transmit e-mail messages
Cyber extortionist
0-day vulnerabilities
Asset classification
12. A function of the session keys distributed by the PKI.
Key risk indicator (KRI) setup
Multinational organization
Confidentiality
Transmit e-mail messages
13. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Transmit e-mail messages
Access control matrix
Return on security investment (ROSI)
Multinational organization
14. provides the most effective protection of data on mobile devices.
Protective switch covers
The awareness and agreement of the data subjects
Gain unauthorized access to applications
Encryption
15. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Trojan horse
Is willing to accept
Hacker
Detection defenses
16. Provides strong online authentication.
Skills inventory
Tailgating
Properly aligned with business goals and objectives
Public key infrastructure (PKI)
17. Computer that has duplicate components so it can continue to operate when one of its main components fail
Continuous analysis - monitoring and feedback
Fault-tolerant computer
Do with the information it collects
Consensus on risks and controls
18. Whenever personal data are transferred across national boundaries; ________________________ are required.
Fault-tolerant computer
Applying the proper classification to the data
IP address packet filtering
The awareness and agreement of the data subjects
19. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Defined objectives
Regulatory compliance
Data mart
Comparison of cost of achievement
20. Would protect against spoofing an internal address but would not provide strong authentication.
IP address packet filtering
Public key infrastructure (PKI)
Detection defenses
The data custodian
21. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Get senior management onboard
Its ability to reduce or eliminate business risks
Continuous monitoring control initiatives
Trojan horse
22. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Undervoltage (brownout)
Its ability to reduce or eliminate business risks
0-day vulnerabilities
Protective switch covers
23. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
The balanced scorecard
Role-based policy
Defining high-level business security requirements
The data custodian
24. Should be determined from the risk assessment results.
Knowledge management
Owner of the information asset
Information contained on the equipment
Audit objectives
25. Determined by the business risk - i.e. - the potential impact on the business of the loss - corruption or disclosure of information. It must be applied to information in all forms - both electronic and physical (paper) - and should be applied by the
Patch management process
SWOT analysis
Single sign-on (SSO) product
Data classification
26. The most important characteristic of good security policies is that they be ____________________.
Aligned with organizational goals
Nondisclosure agreement (NDA)
A network vulnerability assessment
Encryption of the hard disks
27. Involves the correction of software weaknesses and would necessarily follow change management procedures.
Use of security metrics
Digital certificate
Patch management
Threat assessment
28. The risk that remains after putting into place an effective risk management program; therefore - acceptable risk is achieved when this amount is minimized.
Resource dependency assessment
The board of directors and senior management
Residual risk
Internal risk assessment
29. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Stress testing
SWOT analysis
Virus detection
Data mart
30. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Power surge/over voltage (spike)
Cyber terrorist
Regular review of access control lists
Monitoring processes
31. Oversees the overall classification management of the information.
Assess the risks to the business operation
Cost of control
Process of introducing changes to systems
The information security officer
32. When reporting an incident to senior management - the initial information to be communicated should include an explanation of _____________________ A summary of security logs would be too technical to report to senior management. An analysis of the i
The data owner
What happened and how the breach was resolved
Patch management
Safeguards over keys
33. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Residual risk would be reduced by a greater amount
Key risk indicator (KRI) setup
Total cost of ownership (TCO)
Risk management and the requirements of the organization
34. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Data isolation
Risk assessment - evaluation and impact analysis
Calculating the value of the information or asset
Continuous analysis - monitoring and feedback
35. Useful but only with regard to specific technical skills.
Increase business value and confidence
Encryption
Confidentiality
Proficiency testing
36. Occurs when the electrical supply drops
Deeper level of analysis
Undervoltage (brownout)
Calculating the value of the information or asset
Decentralization
37. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Background checks of prospective employees
Role-based access control
Methodology used in the assessment
Risk appetite
38. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Inherent risk
Threat assessment
Multinational organization
Cryptographic secure sockets layer (SSL) implementations and short key lengths
39. Has to be integrated into the requirements of every software application's design.
Encryption key management
Continuous monitoring control initiatives
Data isolation
Key risk indicator (KRI) setup
40. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Skills inventory
MAL wear
Encryption of the hard disks
41. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Defining high-level business security requirements
Multinational organization
Threat assessment
Total cost of ownership (TCO)
42. Provide metrics to which outsourcing firms can be held accountable.
Service level agreements (SLAs)
Public key infrastructure (PKI)
The data custodian
Performing a risk assessment
43. Has full responsibility over data.
Cost of control
Examples of containment defenses
The data owner
A network vulnerability assessment
44. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
The data custodian
Virus
Inherent risk
Impractical and is often cost-prohibitive
45. It is more efficient to establish a ___________________for locations that must meet specific requirements.
A network vulnerability assessment
MAL wear
Baseline standard and then develop additional standards
Overall organizational structure
46. A trusted third party that attests to the identity of the signatory - and reliance will be a function of the level of trust afforded the CA.
Breakeven point of risk reduction and cost
Certificate authority (CA)
Reduce risk to an acceptable level
Centralized structure
47. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Attributes and characteristics of the 'desired state'
Creation of a business continuity plan
Access control matrix
Security baselines
48. Culture has a significant impact on how information security will be implemented in a ______________________.
Data owners
Defined objectives
Monitoring processes
Multinational organization
49. Should be performed to identify the risk and determine needed controls.
Internal risk assessment
Digital certificate
Vulnerability assessment
Phishing
50. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Risk assessment - evaluation and impact analysis
Malicious software and spyware
Biometric access control systems
Residual risk would be reduced by a greater amount