SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most important characteristic of good security policies is that they be ____________________.
Transferred risk
Aligned with organizational goals
Access control matrix
Regular review of access control lists
2. Programs that act without a user's knowledge and deliberately alter a computer's operations
Audit objectives
Skills inventory
Regular review of access control lists
MAL wear
3. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Assess the risks to the business operation
Examples of containment defenses
Is willing to accept
Do with the information it collects
4. When mobile equipment is lost or stolen - the ______________________ matters most in determining the impact of the loss.
Patch management
Information contained on the equipment
Internal risk assessment
Risk management and the requirements of the organization
5. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Alignment with business strategy
Transferred risk
Return on security investment (ROSI)
BIA (Business Impact Assessment
6. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Applying the proper classification to the data
Regulatory compliance
Vulnerability assessment
Equal error rate (EER)
7. Uses security metrics to measure the performance of the information security program.
Data mart
Information contained on the equipment
Cross-site scripting attacks
Information security manager
8. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
A network vulnerability assessment
Classification of assets needs
Reduce risk to an acceptable level
Identify the vulnerable systems and apply compensating controls
9. Program that hides within or looks like a legit program
Transferred risk
Trojan horse
The information security officer
Defining and ratifying the classification structure of information assets
10. When the ________________ is more than the cost of the risk - the risk should be accepted.
Regular review of access control lists
Conduct a risk assessment
Return on security investment (ROSI)
Cost of control
11. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Impractical and is often cost-prohibitive
Control risk
Security code reviews for the entire software application
Fault-tolerant computer
12. Utility program that detects and protects a personal computer from unauthorized intrusions
The balanced scorecard
Personal firewall
Centralization of information security management
Access control matrix
13. Would protect against spoofing an internal address but would not provide strong authentication.
OBusiness case development
Annually or whenever there is a significant change
Logon banners
IP address packet filtering
14. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Its ability to reduce or eliminate business risks
Negotiating a local version of the organization standards
Acceptable use policies
Role-based access control
15. Program that copies itself repeatedly - using up resources and possibly shutting down the computer or network
Key controls
Worm
Tie security risks to key business objectives
Platform security - intrusion detection and antivirus controls
16. The most relevant piece of information to include in a cost-benefit analysis of a two-factor authentication system - it would establish a cost baseline and it must be considered for the full life cycle of the control. .
Total cost of ownership (TCO)
Single sign-on (SSO) product
Certificate authority (CA)
Classification of assets needs
17. Should be determined from the risk assessment results.
Data classification
The data custodian
Its ability to reduce or eliminate business risks
Audit objectives
18. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Logon banners
Patch management
Control effectiveness
Methodology used in the assessment
19. Occurs after the risk assessment process - it does not measure it.
Phishing
Do with the information it collects
Data owners
Use of security metrics
20. To identify known vulnerabilities based on common misconfigurations and missing updates.
A network vulnerability assessment
Worm
Gap analysis
Background check
21. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Transferred risk
Background checks of prospective employees
Properly aligned with business goals and objectives
Residual risk
22. Most effective for evaluating the degree to which information security objectives are being met.
Threat assessment
IP address packet filtering
The balanced scorecard
Requirements of the data owners
23. Awareness - training and physical security defenses.
Digital certificate
Is willing to accept
Baseline standard and then develop additional standards
Examples of containment defenses
24. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Control risk
Classification of assets needs
Use of security metrics
Developing an information security baseline
25. Occurs when the electrical supply drops
Is willing to accept
Use of security metrics
Undervoltage (brownout)
Biometric access control systems
26. The PRIMARY goal in developing an information security strategy is to: _________________________.
Defining and ratifying the classification structure of information assets
Get senior management onboard
Assess the risks to the business operation
Support the business objectives of the organization
27. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Is willing to accept
Multinational organization
Cyber terrorist
Get senior management onboard
28. An organization without any formal information security program should start with _______________________ because the implementation should be based on those security requirements.
Certificate authority (CA)
Spoofing attacks
Defining high-level business security requirements
Single sign-on (SSO) product
29. From a security standpoint - _______________________ is one of the most important topics that should be included in the contract with third-party service provider.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. Applications cannot access data associated with other apps
Risk appetite
Hacker
Data isolation
Annual loss expectancy (ALE)calculations
31. Only valid if assets have first been identified and appropriately valued.
Annual loss expectancy (ALE)calculations
Calculating the value of the information or asset
Asset classification
Spoofing attacks
32. Focuses on identifying vulnerabilities.
Return on security investment (ROSI)
Identify the vulnerable systems and apply compensating controls
Penetration testing
Trusted source
33. provides the most effective protection of data on mobile devices.
Developing an information security baseline
Encryption
Information contained on the equipment
Audit objectives
34. Can be used to detect an external attack but would not help in authenticating a user attempting to connect.
Waterfall chart
Intrusion detection system (IDS)
Undervoltage (brownout)
Countermeasure cost-benefit analysis
35. The MOST important element of an information security strategy.
Defined objectives
Key risk indicator (KRI) setup
Public key infrastructure (PKI)
Data mart
36. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Gap analysis
Classification of assets needs
Cracker
Monitoring processes
37. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Monitoring processes
Increase business value and confidence
Two-factor authentication
Fault-tolerant computer
38. Provides process needs but not impact.
Inherent risk
Patch management process
Tie security risks to key business objectives
Resource dependency assessment
39. It is important to achieve ____________________ - and obtain inputs from various organizational entities since security needs to be aligned to the needs of the organization.
Tie security risks to key business objectives
Fault-tolerant computer
People
Consensus on risks and controls
40. To improve the security governance framework and achieve a higher level of maturity _____________________ is most important.
Creation of a business continuity plan
The board of directors and senior management
Continuous analysis - monitoring and feedback
Digital signatures
41. Normally addressed through antivirus and antispyware policies.
Data isolation
Risk appetite
Malicious software and spyware
Biometric access control systems
42. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Increase business value and confidence
Threat assessment
Process of introducing changes to systems
Creation of a business continuity plan
43. Without _____________________ - there cannot be accountability.
Well-defined roles and responsibilities
Total cost of ownership (TCO)
Trusted source
Regular review of access control lists
44. An information security manager has to impress upon the human resources department the need for _____________________.
Access control matrix
Gap analysis
Deeper level of analysis
Security awareness training for all employees
45. Risk should be reduced to a level that an organization _____________.
Is willing to accept
Biometric access control systems
Alignment with business strategy
People
46. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Encryption key management
Transferred risk
Assess the risks to the business operation
Stress testing
47. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Phishing
Platform security - intrusion detection and antivirus controls
Calculating the value of the information or asset
Nondisclosure agreement (NDA)
48. S small warehouse - designed for the end-user needs in a strategic business unit
Data mart
Data isolation
Platform security - intrusion detection and antivirus controls
Risk management and the requirements of the organization
49. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Classification of assets needs
All personnel
Personal firewall
Digital signatures
50. Information security governance models are highly dependent on the _____________________.
Platform security - intrusion detection and antivirus controls
Defining and ratifying the classification structure of information assets
Threat assessment
Overall organizational structure