SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Negotiating a local version of the organization standards
Information security manager
Risk appetite
Virus
2. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
Inherent risk
Background check
Continuous analysis - monitoring and feedback
Protective switch covers
3. Helps to define the minimum acceptable security that will be implemented to protect the information resources in accordance with the respective criticality levels.
Developing an information security baseline
Creation of a business continuity plan
MAL wear
Trusted source
4. A Successful risk management should lead to a ________________.
Resource dependency assessment
Breakeven point of risk reduction and cost
The board of directors and senior management
Certificate authority (CA)
5. Has to be integrated into the requirements of every software application's design.
Encryption key management
Defining and ratifying the classification structure of information assets
Impractical and is often cost-prohibitive
Decentralization
6. Awareness training would most likely result in any attempted ____________ being challenged by the authorized employee
Tailgating
Stress testing
Data warehouse
Control risk
7. Attackers who exploit flawed ___________________________________ can sniff network traffic and crack keys to gain unauthorized access to information.
Single sign-on (SSO) product
Encryption of the hard disks
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Role-based policy
8. Applications cannot access data associated with other apps
Digital certificate
Patch management process
Data isolation
BIA (Business Impact Assessment
9. The job of the information security officer on a management team is to ___________________.
The balanced scorecard
Exceptions to policy
Prioritization
Assess the risks to the business operation
10. Without _____________________ - there cannot be accountability.
Well-defined roles and responsibilities
Single sign-on (SSO) product
Examples of containment defenses
Support the business objectives of the organization
11. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
The data custodian
Key risk indicator (KRI) setup
Tie security risks to key business objectives
Nondisclosure agreement (NDA)
12. ecurity design flaws require a ____________________.
Reduce risk to an acceptable level
Deeper level of analysis
Vulnerability assessment
Exceptions to policy
13. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
include security responsibilities in a job description
Transmit e-mail messages
Patch management
Defining and ratifying the classification structure of information assets
14. Accesses a computer or network illegally
Cracker
Multinational organization
Continuous analysis - monitoring and feedback
Prioritization
15. The best measure and will involve reviewing the entire source code to detect all instances of back doors.
Background check
Use of security metrics
Security code reviews for the entire software application
Transferred risk
16. The most critical process for deciding which part of the information system/business process should be given prioritization in case of a security incident.It provides results - such as impact from a security incident and required response times.
Cyber terrorist
Comparison of cost of achievement
Biometric access control systems
BIA (Business Impact Assessment
17. Most effective for evaluating the degree to which information security objectives are being met.
Tailgating
The balanced scorecard
Service level agreements (SLAs)
Prioritization
18. Computer that has duplicate components so it can continue to operate when one of its main components fail
Strategic alignment of security with business objectives
Countermeasure cost-benefit analysis
Fault-tolerant computer
Annually or whenever there is a significant change
19. A process that helps organizations manipulate important knowledge that is part of the orgs. memory
Encryption
Cryptographic secure sockets layer (SSL) implementations and short key lengths
Is willing to accept
Knowledge management
20. While useful for identifying the difference between the current state and the desired future state - e.g. organization has to comply with recently published industry regulatory requirements compliance that potentially has high implementation costs -
Gap analysis
Data isolation
OBusiness case development
Resource dependency assessment
21. Responsible for securing the information.
The data custodian
Total cost of ownership (TCO)
Risk assessment - evaluation and impact analysis
Role-based access control
22. Ensure that transmitted information can be attributed to the named sender.
Vulnerability assessment
Compliance with the organization's information security requirements
Single sign-on (SSO) product
Digital signatures
23. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Cross-site scripting attacks
Calculating the value of the information or asset
Comparison of cost of achievement
Spoofing attacks
24. Potentially damaging computer program that affects - or infects a computer negatively by altering the way the computer works
Access control matrix
Comparison of cost of achievement
Virus
Consensus on risks and controls
25. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Methodology used in the assessment
Single sign-on (SSO) product
Get senior management onboard
The board of directors and senior management
26. Are expensive - so they have to be used in areas where the risk is at its greatest level. These areas are the ones with high impact and high frequency of occurrence.
Continuous monitoring control initiatives
Annual loss expectancy (ALE)calculations
Gain unauthorized access to applications
Increase business value and confidence
27. The BEST justification to convince management to invest in an information security program is that doing so would _________________.
Data owners
Increase business value and confidence
Information contained on the equipment
Single sign-on (SSO) product
28. BEST option to improve accountability for a system administrator is to _____________________.
Digital certificate
include security responsibilities in a job description
Transmit e-mail messages
The data owner
29. _________________________ will allow the information security manager to prioritize the remedial measures and provide a means to convey a sense of urgency to management.
Performing a risk assessment
Transferred risk
Examples of containment defenses
The balanced scorecard
30. Will prevent unauthorized access to the laptop even when the laptop is lost or stolen.
Phishing
Logon banners
Fault-tolerant computer
Encryption of the hard disks
31. Are not infallible. When tuning the solution - one has to adjust the sensitivity level to give preference either to false reject rate (type I error rate) where the system will be more prone to err denying access to a valid user or erring and allowing
Biometric access control systems
Get senior management onboard
Threat assessment
BIA (Business Impact Assessment
32. Logging as well as monitoring - measuring - auditing - detecting viruses and intrusion.
Gain unauthorized access to applications
Detection defenses
Breakeven point of risk reduction and cost
Public key infrastructure (PKI)
33. When defining the information classification policy - the ___________________ need to be identified.
Security baselines
Requirements of the data owners
Alignment with business strategy
Overall organizational structure
34. Company or person you believe will not send a virus-infect file knowingly
Trusted source
Certificate authority (CA)
Conduct a risk assessment
Residual risk would be reduced by a greater amount
35. A method for analyzing and reducing a relational database to its most streamlined form
Normalization
Trusted source
Control risk
Properly aligned with business goals and objectives
36. The primary role of the information security manager in the process of information classification within the organization.
Normalization
Gap analysis
Logon banners
Defining and ratifying the classification structure of information assets
37. An effective tool but primarily focuses on malicious code from external sources - and only for those applications that are online.
Consensus on risks and controls
Virus detection
Detection defenses
Its ability to reduce or eliminate business risks
38. Reducing risk to a level too small to measure is _______________.
Security code reviews for the entire software application
Impractical and is often cost-prohibitive
Get senior management onboard
IP address packet filtering
39. Cannot be minimized
Defining and ratifying the classification structure of information assets
Security baselines
Inherent risk
Impractical and is often cost-prohibitive
40. The MOST useful way to describe the objectives in the information security strategy is through ______________________.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. May show the performance result of the security related activities; however - the result is interpreted in terms of money and extends to multiple facets of security initiatives.
The database administrator
Return on security investment (ROSI)
The information security officer
Encryption of the hard disks
42. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
Cross-site scripting attacks
Stress testing
Creation of a business continuity plan
Aligned with organizational goals
43. New security ulnerabilities should be managed through a ________________.
Safeguards over keys
Patch management process
Defining and ratifying the classification structure of information assets
The database administrator
44. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Security awareness training for all employees
Knowledge management
Security code reviews for the entire software application
Vulnerability assessment
45. Should PRIMARILY be based on regulatory and legal requirements.
Knowledge management
Retention of business records
Defined objectives
Data isolation
46. Whenever personal data are transferred across national boundaries; ________________________ are required.
IP address packet filtering
Control effectiveness
The awareness and agreement of the data subjects
Baseline standard and then develop additional standards
47. A tool to be used in internal control assessment. KRI setup presents a threshold to alert management when controls are being compromised in business processes. This is a control tool rather than a maturity model support tool.
Annual loss expectancy (ALE)calculations
Cracker
Stress testing
Key risk indicator (KRI) setup
48. Has full responsibility over data.
SWOT analysis
Continuous monitoring control initiatives
The information security officer
The data owner
49. Addresses strengths - weaknesses - opportunities and threats. Although useful - a SWOT analysis is not as effective a tool.
Background checks of prospective employees
SWOT analysis
Cross-site scripting attacks
Virus
50. Effective and efficient in large user communities because it controls system access by the roles defined for groups of users. Users are assigned to the various roles and the system controls the access based on those roles.
Return on security investment (ROSI)
Attributes and characteristics of the 'desired state'
Role-based access control
Vulnerability assessment