SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Patch management process
Get senior management onboard
What happened and how the breach was resolved
Cracker
2. __________________________ is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Is willing to accept
The data owner
Cracker
Alignment with business strategy
3. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Residual risk would be reduced by a greater amount
Classification of assets needs
Intrusion detection system (IDS)
Return on security investment (ROSI)
4. Utility program that detects and protects a personal computer from unauthorized intrusions
Asset classification
Trojan horse
Trusted source
Personal firewall
5. The best strategy for risk management is to ___________________- as this will take into account the organization's appetite for risk and the fact that it would not be practical to eliminate all risk.
Residual risk would be reduced by a greater amount
Encryption key management
Reduce risk to an acceptable level
MAL wear
6. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Retention of business records
Worm
Security code reviews for the entire software application
Power surge/over voltage (spike)
7. Because past performance is a strong predictor of future performance - _______________________ best prevents attacks from originating within an organization.
Public key infrastructure (PKI)
Key controls
Background checks of prospective employees
Security risk
8. Responsible for securing the information.
The data custodian
Key controls
Developing an information security baseline
Transmit e-mail messages
9. The best indicator of the level of compliance with the service level agreement ( SLA ) data confidentiality clauses.
Proficiency testing
Access control matrix
Cracker
Fault-tolerant computer
10. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Risk management and the requirements of the organization
Calculating the value of the information or asset
The board of directors and senior management
Methodology used in the assessment
11. Should PRIMARILY be based on regulatory and legal requirements.
Digital certificate
Requirements of the data owners
Retention of business records
People
12. When the ________________ is more than the cost of the risk - the risk should be accepted.
Cost of control
Hacker
BIA (Business Impact Assessment
Personal firewall
13. The information security manager needs to prioritize the controls based on ________________________.
Risk management and the requirements of the organization
A network vulnerability assessment
The awareness and agreement of the data subjects
Support the business objectives of the organization
14. Provide minimum recommended settings and do not prevent introduction of control weaknesses.'
Retention of business records
Acceptable use policies
Service level agreements (SLAs)
Security baselines
15. Should be determined from the risk assessment results.
Annually or whenever there is a significant change
Virus detection
The information security officer
Audit objectives
16. The MAIN reason why _______________ is important to a successful information security program is because classification determines the appropriate level of protection to the asset.
Safeguards over keys
Asset classification
Overall organizational structure
Key controls
17. Risk should be reduced to a level that an organization _____________.
Cross-site scripting attacks
Is willing to accept
Single sign-on (SSO) product
Information security manager
18. Carries out the technical administration.
Control risk
Strategic alignment of security with business objectives
Reduce risk to an acceptable level
The database administrator
19. Allows you to use field security personnel as security missionaries or ambassadors to spread the security awareness message. It allows security administrators to be more responsive.
Internal risk assessment
Decentralization
Overall organizational structure
Resource dependency assessment
20. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Role-based access control
The database administrator
Control effectiveness
21. The MOST important element of an information security strategy.
Acceptable use policies
Consensus on risks and controls
Intrusion detection system (IDS)
Defined objectives
22. Should be a standard requirement for the service provider.
Patch management process
Background check
Resource dependency assessment
Key risk indicator (KRI) setup
23. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Countermeasure cost-benefit analysis
Transmit e-mail messages
Do with the information it collects
Control risk
24. Awareness - training and physical security defenses.
Performing a risk assessment
Examples of containment defenses
Vulnerability assessment
Overall organizational structure
25. Lists only the threats that the information asset is exposed to. It does not consider the value of the asset and impact of the threat on the value.
Threat assessment
Countermeasure cost-benefit analysis
Patch management process
Biometric access control systems
26. Occurs when the electrical supply drops
Impractical and is often cost-prohibitive
The board of directors and senior management
Prioritization
Undervoltage (brownout)
27. Inject malformed input.
Cross-site scripting attacks
Nondisclosure agreement (NDA)
Undervoltage (brownout)
The awareness and agreement of the data subjects
28. The PRIMARY goal in developing an information security strategy is to: _________________________.
Inherent risk
Support the business objectives of the organization
Undervoltage (brownout)
Attributes and characteristics of the 'desired state'
29. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Increase business value and confidence
Regular review of access control lists
Worm
Centralization of information security management
30. Provides strong online authentication.
Public key infrastructure (PKI)
Cross-site scripting attacks
Data owners
Defined objectives
31. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Encryption
Its ability to reduce or eliminate business risks
Control risk
Single sign-on (SSO) product
32. Culture has a significant impact on how information security will be implemented in a ______________________.
Trojan horse
BIA (Business Impact Assessment
Public key infrastructure (PKI)
Multinational organization
33. Also required to guarantee fulfillment of laws and regulations of the organization and - therefore - the information security manager will be obligated to comply with the law.
Intrusion detection system (IDS)
Monitoring processes
Calculating the value of the information or asset
The balanced scorecard
34. Someone who accesses a computer or network illegally
Vulnerability assessment
Return on security investment (ROSI)
Hacker
Total cost of ownership (TCO)
35. The starting point for driving management's attention to information security. All other choices will follow the risk assessment.
Risk assessment - evaluation and impact analysis
Spoofing attacks
Skills inventory
Proficiency testing
36. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Spoofing attacks
Risk management and the requirements of the organization
Lack of change management
Performing a risk assessment
37. The MOST important component of a privacy policy is: A Privacy policies must contain _______________; they are a high-level management statement of direction. They do not necessarily address warranties - liabilities or geographic coverage - which are
Notifications and opt-out provisions
Use of security metrics
Inherent risk
The authentication process is broken
38. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
The data owner
Single sign-on (SSO) product
Data mart
Key risk indicator (KRI) setup
39. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
People
Its ability to reduce or eliminate business risks
Developing an information security baseline
Increase business value and confidence
40. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Creation of a business continuity plan
Continuous monitoring control initiatives
Trojan horse
Stress testing
41. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Detection defenses
The information security officer
Proficiency testing
The authentication process is broken
42. BEST option to improve accountability for a system administrator is to _____________________.
include security responsibilities in a job description
Aligned with organizational goals
Multinational organization
Countermeasure cost-benefit analysis
43. The _____________________ should be the person with the decision-making power in the department deriving the most benefit from the asset.
Developing an information security baseline
Owner of the information asset
Information contained on the equipment
The data custodian
44. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Script kiddie
Identify the relevant systems and processes
Security risk
Waterfall chart
45. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Data owners
Do with the information it collects
Knowledge management
Public key infrastructure (PKI)
46. Whenever personal data are transferred across national boundaries; ________________________ are required.
Virus detection
Tailgating
The awareness and agreement of the data subjects
Data mart
47. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Nondisclosure agreement (NDA)
Control effectiveness
Worm
Classification of assets needs
48. Will associate data access with the role performed by an individual - thus restricting access to data required to perform the individual's tasks.
Residual risk would be reduced by a greater amount
MAL wear
Creation of a business continuity plan
Role-based policy
49. It is more efficient to establish a ___________________for locations that must meet specific requirements.
Security code reviews for the entire software application
Overall organizational structure
Baseline standard and then develop additional standards
Equal error rate (EER)
50. Focuses on identifying vulnerabilities.
The awareness and agreement of the data subjects
Baseline standard and then develop additional standards
Conduct a risk assessment
Penetration testing