SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISM: Certified Information Security Manager
Start Test
Study First
Subjects
:
certifications
,
cism
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. By definition are not previously known and therefore are undetectable.
What happened and how the breach was resolved
0-day vulnerabilities
Background checks of prospective employees
Power surge/over voltage (spike)
2. Would reduce the possibility of an individual accidentally pressing the power button on a device - thereby turning off the device.
include security responsibilities in a job description
Calculating the value of the information or asset
Protective switch covers
Process of introducing changes to systems
3. In biometric systems where the possibility of false rejects is a problem - it may be necessary to reduce sensitivity and thereby increase the number of false accepts.
Applying the proper classification to the data
Reduce risk to an acceptable level
Phishing
Equal error rate (EER)
4. On a company's e-commerce web site - a good legal statement regarding data privacy should include a statement regarding what the company will ___________________.
Security risk
Do with the information it collects
Centralization of information security management
Asset classification
5. Lists only the vulnerabilities inherent in the information asset that can attract threats. It does not consider the value of the asset and the impact of perceived threats on the value.
Classification of assets needs
Use of security metrics
Vulnerability assessment
Defining and ratifying the classification structure of information assets
6. The risk that controls may not prevent/detect an incident with a measure of control effectiveness.
Gap analysis
Continuous monitoring control initiatives
Control risk
Annual loss expectancy (ALE)calculations
7. The information security manager needs to prioritize the controls based on ________________________.
Monitoring processes
Reduce risk to an acceptable level
Risk management and the requirements of the organization
Digital certificate
8. Should be determined from the risk assessment results.
SWOT analysis
Identify the vulnerable systems and apply compensating controls
Personal firewall
Audit objectives
9. When considering the value of assets ______________________ would give the information security manager the MOST objective basis for measurement of value delivery in information security governance
Script kiddie
Cyber extortionist
Multinational organization
Comparison of cost of achievement
10. Most effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network.
Comparison of cost of achievement
Continuous monitoring control initiatives
Penetration testing
Safeguards over keys
11. Most effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices.
Biometric access control systems
Monitoring processes
Regular review of access control lists
Centralization of information security management
12. The risk that has been assumed by a third party and may not necessarily be equal to the minimal form of residual risk.
Increase business value and confidence
Defining high-level business security requirements
Transferred risk
All personnel
13. The PRIMARY goal in developing an information security strategy is to: _________________________.
Negotiating a local version of the organization standards
Trojan horse
Background checks of prospective employees
Support the business objectives of the organization
14. To determine sensitivity of assets in terms of risk to the business operation so that proportional countermeasures can be effectively implemented.
Classification of assets needs
A network vulnerability assessment
Security baselines
Risk appetite
15. In assessing the degree to which an organization may be affected by new privacy legislation - information security management should first _____________________.
Identify the relevant systems and processes
Knowledge management
Regular review of access control lists
Nondisclosure agreement (NDA)
16. The MOST effective approach to address issues that arise between IT management - business units and security management when implementing a new security strategy is for the information security manager to ____________________ with any security recomm
Get senior management onboard
Gap analysis
Data mart
Skills inventory
17. Responsible for securing the information.
The data custodian
Cracker
Nondisclosure agreement (NDA)
The database administrator
18. The most fundamental evaluation criteria for the appropriate selection of any security technology is ________________________.
Retention of business records
Monitoring processes
Its ability to reduce or eliminate business risks
The balanced scorecard
19. Risk assessment is a very important process for the ___________________. Risk assessment provides information on the likelihood of occurrence of security incidence and assists in the selection of countermeasures - but not in the prioritization.
include security responsibilities in a job description
Regulatory compliance
Creation of a business continuity plan
Breakeven point of risk reduction and cost
20. A function of the session keys distributed by the PKI.
0-day vulnerabilities
Proficiency testing
Confidentiality
Classification of assets needs
21. Has to be integrated into the requirements of every software application's design.
Cyber terrorist
Data owners
Script kiddie
Encryption key management
22. There is a time lag between the time when a security vulnerability is first published - and the time when a patch is delivered. - The best protection is to _____________________ until a patch is installed.
People
Identify the vulnerable systems and apply compensating controls
Protective switch covers
Service level agreements (SLAs)
23. Only valid if assets have first been identified and appropriately valued.
Multinational organization
Annual loss expectancy (ALE)calculations
Countermeasure cost-benefit analysis
Data warehouse
24. Applications cannot access data associated with other apps
Data isolation
Return on security investment (ROSI)
Examples of containment defenses
Assess the risks to the business operation
25. Someone who uses email as a vehicle for extortion; send company threatening emails indicating they will expose confidential information - exploit security launch - etc.
Cyber extortionist
Data isolation
The database administrator
Logon banners
26. Occurs when the electrical supply drops
Security risk
Comparison of cost of achievement
Undervoltage (brownout)
Requirements of the data owners
27. Oversees the overall classification management of the information.
include security responsibilities in a job description
Key risk indicator (KRI) setup
Security risk
The information security officer
28. New security ulnerabilities should be managed through a ________________.
Requirements of the data owners
Gain unauthorized access to applications
Encryption of the hard disks
Patch management process
29. Responsible for assigning user entitlements and approving access to the systems for which they are responsible.
Normalization
The awareness and agreement of the data subjects
Data owners
Applying the proper classification to the data
30. Whenever personal data are transferred across national boundaries; ________________________ are required.
Security risk
Encryption key management
Nondisclosure agreement (NDA)
The awareness and agreement of the data subjects
31. If the firewall allows source routing - any outsider can carry out _________________ by stealing the internal (private) IP addresses of the organization.
Spoofing attacks
SWOT analysis
What happened and how the breach was resolved
Identify the relevant systems and processes
32. Needs to define the access rules - which is troublesome and error prone in large organizations.
The board of directors and senior management
Rule-based access control
Classification of assets needs
Patch management process
33. Should be performed to identify the risk and determine needed controls.
Key risk indicator (KRI) setup
Calculating the value of the information or asset
Exceptions to policy
Internal risk assessment
34. Residual risk is unmanaged - i.e. - inherent risk which remains uncontrolled. This is key to the organization's _____________ and is the amount of residual risk that a business is living with that affects its viability.
Risk appetite
Resource dependency assessment
Owner of the information asset
Classification of assets needs
35. Should PRIMARILY be based on regulatory and legal requirements.
Retention of business records
Data classification
Alignment with business strategy
Fault-tolerant computer
36. Primarily reduce risk and are most effective for the protection of information assets.
Key controls
Annual loss expectancy (ALE)calculations
Support the business objectives of the organization
Residual risk would be reduced by a greater amount
37. The MOST important element of an information security strategy.
Defined objectives
Resource dependency assessment
Annually or whenever there is a significant change
Continuous analysis - monitoring and feedback
38. The security manager would be most concerned with whether _____________________ than the cost of adding additional controls.
Residual risk would be reduced by a greater amount
Encryption key management
Key risk indicator (KRI) setup
Waterfall chart
39. Useful but only with regard to specific technical skills.
Proficiency testing
Owner of the information asset
Background check
Platform security - intrusion detection and antivirus controls
40. Most effective for evaluating the degree to which information security objectives are being met.
Single sign-on (SSO) product
Background check
Worm
The balanced scorecard
41. The weakest link in security implementation - and awareness would reduce this risk. Through security awareness and training programs - individual employees can be informed and sensitized on various security policies and other security topics - thus e
People
Get senior management onboard
Worm
Conduct a risk assessment
42. Adherence to local regulations must always be the priority. _______________________ is the most effective compromise in this situation.
Negotiating a local version of the organization standards
Classification of assets needs
Monitoring processes
Hacker
43. Senior management commitment and support for information security can BEST be obtained through presentations that ____________________.
Gap analysis
The database administrator
Tie security risks to key business objectives
Data classification
44. _______________ of the organization have the responsibility of ensuring information systems security this can include indirect personnel such as physical security personnel.
Encryption
SWOT analysis
All personnel
Get senior management onboard
45. provides the most effective protection of data on mobile devices.
Security awareness training for all employees
Assess the risks to the business operation
Encryption
Security code reviews for the entire software application
46. Program that hides within or looks like a legit program
Trojan horse
People
Impractical and is often cost-prohibitive
Resource dependency assessment
47. The first step in a risk analysis process to determine the impact to the organization - which is the ultimate goal.
Centralization of information security management
Classification of assets needs
Calculating the value of the information or asset
Support the business objectives of the organization
48. The MOST important element of the request for proposal (RFP) ro assess the maturity level of the organization's information security management is _______________________.
Its ability to reduce or eliminate business risks
Defining and ratifying the classification structure of information assets
Compliance with the organization's information security requirements
Methodology used in the assessment
49. Using public key infrastructure (PKI) is currently accepted as the most secure method to _____________.
Classification of assets needs
Assess the risks to the business operation
Annually or whenever there is a significant change
Transmit e-mail messages
50. Normally addressed through antivirus and antispyware policies.
What happened and how the breach was resolved
Malicious software and spyware
Inherent risk
Detection defenses
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests