SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A record that must be preserved and available for retrieval if needed.
Vital Record
Forensic Copy
Cold Site
Information Flow Model
2. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Surveillance
Polymorphism
Business Recovery Timeline
Trapdoors (Backdoors) (Maintenance Hooks)
3. Unauthorized wireless network access device.
Digital Certificate
Incident Response
Rogue Access Points
Procedure
4. A system designed to prevent unauthorized access to or from a private network.
Chain of Custody
Firewall
Security Blueprint
Message Digest
5. Subject based description of a system or a collection of resources
Capability Tables
Key Management
Activation
Honeypot
6. Intellectual property protection for an invention
Restoration
ISO/IEC 27001
Patent
Access Point
7. A programming device use in development to circumvent controls
False (False Positive)
Honeynet
Trapdoors (Backdoors) (Maintenance Hooks)
Trojan Horse
8. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Site Policy
Activation
Encryption
9. A process state - to be executing a process on the CPU
Running
File Sharing
Shielding
Distributed Denial Of Service
10. Encryption system using shared key/private key/single key/secret key
Symmetric
Keyed-Hashing For Message Authentication
Standalone Test
Transfer
11. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Simulation Test
Alternate Site
IP Fragmentation
Infrastructure
12. Recovery alternative - short-term - high cost movable processing location
Strong Authentication
Mobile Site
Control Category
Trade Secret
13. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Contact List
Computer Forensics
Redundant Array Of Independent Drives (RAID)
Coaxial Cable
14. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Injection
Eavesdropping
Log
Business Unit Recovery
15. Memory - RAM
HTTP Response Splitting
Fiber Optics
Hearsay Evidence
Primary Storage
16. May be responsible for overall recovery of an organization or unit(s).
Data Diddler
Governance
CPU Cache
DR Or BC Coordinator
17. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Sequence Attacks
Microwave
Protection
Atomicity
18. A race condition where the security changes during the object's access
ISO/IEC 27002
Virus
Time Of Check/Time Of Use
Exercise
19. Sphere of influence
Walk Though
Investigation
Information Flow Model
Domain
20. A basic level of network access control that is based upon information contained in the IP packet header.
Processes are Isolated By
Due Diligence
Packet Filtering
JPEG (Joint Photographic Experts Group)
21. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Data Hiding
ff Site
Data Backup Strategies
Tort
22. Process whereby data is removed from active files and other data storage structures
Threats
Mandatory
Checksum
Deletion
23. Recording activities at the keyboard level
Walk Though
Recovery
Digital Certificate
Keystroke Logging
24. For PKI - to have more than one person in charge of a sensitive function
Interception
Stopped
Locard's Principle
Multi-Party Control
25. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Packet Filtering
Proprietary
Stopped
Pointer
26. Potential danger to information or systems
Object Reuse
Threats
Risk Assessment
Criminal Law
27. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Intrusion Prevention Systems
Sequence Attacks
Top Secret
28. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Tar Pits
Checkpoint
Contingency Plan
Object
29. Amount of time for restoring a business process or function to normal operations without major loss
Maximum Tolerable Downtime (MTD)
Database Shadowing
Examples of technical security components
Payload
30. Granular decision by a system of permitting or denying access to a particular resource on the system
Authorization
Stopped
Total Risk
Activation
31. A signal suggesting a system has been or is being attacked.
5 Rules Of Evidence
Forensic Copy
ISO/IEC 27001
Alert/Alarm
32. Converts a high level language into machine language
Elements of Negligence
Civil Or Code Law
Adware
Assembler
33. To move from location to location - keeping the same function
Administrative Law
HTTP Response Splitting
Running Key
Job Rotation
34. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Business Records
Business Recovery Team
Byte Level Deletion
Faraday Cage/ Shield
35. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Data Leakage
Incident
Common Criteria
Firewalls
36. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Top Secret
Data Leakage
Security Domain
Orange Book A Classification
37. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Alert
Investigation
Backup
Risk
38. A state for operating system tasks only
Risk Assessment / Analysis
Warm Site
Blackout
Supervisor Mode (monitor - system - privileged)
39. With enough computing power trying all possible combinations
Open Mail Relay Servers
Mitigate
Brute Force
TNI (Red Book)
40. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
State Machine Model
Gateway
Declaration
Plan Maintenance Procedures
41. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Phishing
Multi-Party Control
TEMPEST
Containment
42. Asymmetric encryption of a hash of message
Digital Signature
Polymorphism
Tracking
Inheritance
43. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Business Continuity Planning (BCP)
Complete
Active Data
Multiplexers
44. Initial surge of current
Inrush Current
Race Condition
Civil Law
Access Control Lists
45. Subjects will not interact with each other's objects
Non-Interference
Kerberos
ITSEC
Compression
46. Reduces causes of fire
Man-In-The-Middle Attack
Interference (Noise)
Fire Prevention
Accreditation
47. System of law based upon what is good for society
Business Unit Recovery
Network Attached Storage (NAS)
Journaling
Civil Or Code Law
48. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. Short period of low voltage.
BCP Testing Drills and Exercises
Threats
Sag/Dip
Procedure
50. A type of multitasking that allows for more even distribution of computing time among competing request
Transfer
Incident
Preemptive
Teardrop