Christian Haller
Test por , creado hace más de 1 año

Test sobre CISM Quiz, creado por Christian Haller el 21/06/2014.

2264
0
0
Christian Haller
Creado por Christian Haller hace más de 10 años
Cerrar

CISM Quiz

Pregunta 1 de 30

1

A security strategy is important for an organization PRIMARILY because it provides

Selecciona una de las siguientes respuestas posibles:

  • basis for determining the best logical security architecture for the organization

  • management intent and direction for security activities

  • provides users guidance on how to operate securely in everyday tasks

  • helps IT auditors ensure compliance

Explicación

Pregunta 2 de 30

1

The MOST important reason to make sure there is good communication about security throughout the organization is:

Selecciona una de las siguientes respuestas posibles:

  • to make security more palatable to resistant employees

  • because people are the biggest security risk

  • to inform business units about security strategy

  • to conform to regulations requiring all employees are informed about security

Explicación

Pregunta 3 de 30

1

The regulatory environment for most organizations mandates a variety of security-related activities. It is MOST important that the information security manager:

Selecciona una de las siguientes respuestas posibles:

  • rely on corporate counsel to advise which regulations are relevant

  • stay current with all relevant regulations and request legal interpretation

  • involve all impacted departments and treat regulations as just another risk

  • ignore many of the regulations that have no teeth

Explicación

Pregunta 4 de 30

1

The MOST important consideration in developing security policies is that:

Selecciona una de las siguientes respuestas posibles:

  • they are based on a threat profile

  • they are complete and no detail is let out

  • management signs off on them

  • all employees read and understand them

Explicación

Pregunta 5 de 30

1

The PRIMARY security objective in creating good procedures is

Selecciona una de las siguientes respuestas posibles:

  • to make sure they work as intended

  • that they are unambiguous and meet the standards

  • that they be written in plain language

  • that compliance can be monitored

Explicación

Pregunta 6 de 30

1

The assignment of roles and responsibilities will be MOST effective if:

Selecciona una de las siguientes respuestas posibles:

  • there is senior management support

  • the assignments are consistent with proficiencies

  • roles are mapped to required competencies

  • responsibilities are undertaken on a voluntary basis

Explicación

Pregunta 7 de 30

1

The PRIMARY benefit organizations derive from effective information security governance is:

Selecciona una de las siguientes respuestas posibles:

  • ensuring appropriate regulatory compliance

  • ensuring acceptable levels of disruption

  • prioritizing allocation of remedial resources

  • maximizing return on security investments

Explicación

Pregunta 8 de 30

1

From an information security manager’s perspective, the MOST important factors regarding data retention are:

Selecciona una de las siguientes respuestas posibles:

  • business and regulatory requirements

  • document integrity and destruction

  • media availability and storage

  • data confidentiality and encryption

Explicación

Pregunta 9 de 30

1

Which role is in the BEST position to review and confirm the appropriateness of a user access list?

Selecciona una de las siguientes respuestas posibles:

  • data owner

  • information security manager

  • domain administrator

  • business manager

Explicación

Pregunta 10 de 30

1

In implementing information security governance, the information security manager is PRIMARILY responsible for:

Selecciona una de las siguientes respuestas posibles:

  • developing the security strategy

  • reviewing the security strategy

  • communicating the security strategy

  • approving the security strategy

Explicación

Pregunta 11 de 30

1

The overall objective of risk management is to:

Selecciona una de las siguientes respuestas posibles:

  • eliminate all vulnerabilities, if possible

  • determine the best way to transfer risk

  • reduce risks to an acceptable level

  • implement effective countermeasures

Explicación

Pregunta 12 de 30

1

The statement „risk = value x vulnerability x threat“ indicates that:

Selecciona una de las siguientes respuestas posibles:

  • risk can be quantified using annual loss expectancy (ALE)

  • approximate risk can be estimated, provided probability is computed

  • the level of risk is greater when more threats meet more vulnerabilities

  • without knowing value, risk cannot be calculated

Explicación

Pregunta 13 de 30

1

To address changes in risk, an effective risk management program should:

Selecciona una de las siguientes respuestas posibles:

  • ensure that continuous monitoring processes are in place

  • establish proper security baselines for all information resources

  • implement a complete data classification process

  • change security policies on a timely basis to address changing risks

Explicación

Pregunta 14 de 30

1

Information classification is important to properly manage risk PRIMARILY because:

Selecciona una de las siguientes respuestas posibles:

  • it ensures accountability for information resources as required by roles and responsibilities

  • it is legal requirement under various regulations

  • there is no other way to meet the requirements for availability, integrity and auditability

  • it is used to identify the sensitivity and criticality of information to the organization

Explicación

Pregunta 15 de 30

1

Vulnerabilities discovered during an assessment should be:

Selecciona una de las siguientes respuestas posibles:

  • handled as a risk, even though there is no threat

  • prioritized for remediation solely based on impact

  • a basis for analyzing the effectiveness of controls

  • evaluated for threat and impact in addition to cost of mitigation

Explicación

Pregunta 16 de 30

1

Indemnity (Schadensersatz) agreements can be used to:

Selecciona una de las siguientes respuestas posibles:

  • ensure an agreed-upon level of service

  • reduce impacts on critical resources

  • transfer responsibility to a third party

  • provide an effective countermeasure to threats

Explicación

Pregunta 17 de 30

1

Residual risks can be determined by:

Selecciona una de las siguientes respuestas posibles:

  • determining remaining vulnerabilities after countermeasures are in place

  • a threat analysis

  • a risk assessment

  • transferring all risks

Explicación

Pregunta 18 de 30

1

Data owners are PRIMARILY responsible for creating risk mitigation strategies to address which of the following areas?

Selecciona una de las siguientes respuestas posibles:

  • platform security

  • entitlement changes

  • intrusion detection

  • antivirus controls

Explicación

Pregunta 19 de 30

1

A risk analysis should:

Selecciona una de las siguientes respuestas posibles:

  • limit the scope to a benchmark of similar companies

  • assume an equal degree of protection for all assets

  • address the potential size and likelihood of loss

  • give more weight to the likelihood vs. the size of the loss

Explicación

Pregunta 20 de 30

1

Which of the following is BEST for preventing an external attack?

Selecciona una de las siguientes respuestas posibles:

  • static IP addresses

  • network address translation

  • background checks for temporary employees

  • writing computer logs to removable media

Explicación

Pregunta 21 de 30

1

Who is in the BEST position to develop the priorities and identify what risks and impacts would occur if there were a loss or corruption of the organization‘s information resources?

Selecciona una de las siguientes respuestas posibles:

  • internal auditors

  • security management

  • business process owners

  • external regulatory agencies

Explicación

Pregunta 22 de 30

1

The MOST important single concept for an information security architect to keep in mind is:

Selecciona una de las siguientes respuestas posibles:

  • plan do check act

  • confidentiality, integrity, availablility

  • prevention, detection, correction

  • tone at the top

Explicación

Pregunta 23 de 30

1

Which of the following is the BEST method of limiting the impact of vulnerabilities inherent to wireless networks?

Selecciona una de las siguientes respuestas posibles:

  • require private, key based encryption to connect to the wireless network

  • enable auditing on every host that connects to a wireless network

  • require that every host that connects to this network is have a well tested recovery plan

  • enable auditing on every connection to the wireless network

Explicación

Pregunta 24 de 30

1

In an environment that practises defense in depth, an Internet application that requires a login for a user to access it would also require which of the following additional controls?

Selecciona una de las siguientes respuestas posibles:

  • user authentication

  • user audit trails

  • network load balancing

  • network authentication

Explicación

Pregunta 25 de 30

1

If an information security manager has responsibility for application security review, which of the following additional responsibilities present a conflict of interest in performing the review?

Selecciona una de las siguientes respuestas posibles:

  • operation system recovery

  • application administration

  • network change control

  • host based intrusion detection

Explicación

Pregunta 26 de 30

1

Which of the following BEST promotes accountability?

Selecciona una de las siguientes respuestas posibles:

  • compliance monitoring

  • awareness training

  • secure implementation

  • documented policy

Explicación

Pregunta 27 de 30

1

Which of the following conclusions render the sentence MOST accurate? Vulnerabilities combined with threats:

Selecciona una de las siguientes respuestas posibles:

  • always results in damage

  • require controls to avoid damage

  • allow exploits that may cause damage

  • always results in exploits

Explicación

Pregunta 28 de 30

1

In which state of the systems development life cycle (SDLC) should the information security manager create a list of security issues presented by the functional description of a newly planned system?

Selecciona una de las siguientes respuestas posibles:

  • feasibility

  • requirements

  • design

  • development

Explicación

Pregunta 29 de 30

1

What is the FIRST step in designing a secure client server environment?

Selecciona una de las siguientes respuestas posibles:

  • identify all data access points

  • establish operating system security on all platforms

  • require hard passwords

  • place a firewall between the server and clients

Explicación

Pregunta 30 de 30

1

What BEST represents the hierarchy of access control strength, from weakest to strongest?

Selecciona una de las siguientes respuestas posibles:

  • what you have, what you are, what you know

  • what you know, what you have, what you are

  • what you are, what you have, what you know

  • what you are, what you know, what you have information Security Program

Explicación