SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Inappropriate data
CobiT
Off-Site Storage
Malformed Input
Salami
2. Final purpose or result
Walk Though
Authorization
Payload
Certificate Revocation List (CRL)
3. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
JPEG (Joint Photographic Experts Group)
Public Key Infrastructure (PKI)
Simulation
Authentication
4. Weakness or flaw in an asset
Incident
Fire Suppression
Vulnerability
Polymorphism
5. High level design or model with a goal of consistency - integrity - and balance
Architecture
Notification
Critical Functions
Threads
6. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Discretionary Access Control (DAC)
Multi-Processing
Notification
7. Subject based description of a system or a collection of resources
Domain
Asymmetric
Record Level Deletion
Capability Tables
8. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Vulnerability
Threats
Access Control Matrix
Analysis
9. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Emergency Procedures
Safeguard
Malformed Input
Mission-Critical Application
10. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Privacy Laws
Running Key
Spam
Strong Authentication
11. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Information Flow Model
Worm
Collisions
Data Recovery
12. Weak evidence
Honeynet
Hearsay
Recovery Period
Disaster Recovery Tape
13. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Botnet
Worm
Rollback
Kerberos
14. Recording the Who What When Where How of evidence
Chain Of Custody
Smurf
Network Attached Storage (NAS)
Noise
15. Maintenance procedures outline the process for the review and update of business continuity plans.
Plan Maintenance Procedures
Network Attached Storage (NAS)
Deadlock
Preemptive
16. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
False Attack Stimulus
Computer System Evidence
Code
Remote Journaling
17. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Machine Language (Machine Code)
UPS
Alert
Emergency Procedures
18. Trading one for another
Non-Interference
Substitution
TIFF (Tagged Image File Format)
Proprietary
19. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Attacker (Black hat - Hacker)
Standalone Test
Alarm Filtering
Desk Check Test
20. A race condition where the security changes during the object's access
Moore's Law
Convincing
Disaster Recovery Plan
Time Of Check/Time Of Use
21. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Stopped
MOM
Checklist Test
Electronic Vaulting
22. An administrative unit or a group of objects and subjects controlled by one reference monitor
Patch Management
Reference Monitor
Method
Security Domain
23. To know more than one job
Architecture
Disaster Recovery Tape
Cross Training
Residual Data
24. To reduce sudden rises in current
Surge Suppressor
Fraggle
CobiT
TCSEC (Orange Book)
25. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Policy
Crisis
Honeynet
Fire Classes
26. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Buffer Overflow
Threats
Full Test (Full Interruption)
Cryptovariable
27. Independent malware that requires user interaction to execute
Education
Virus
Safeguard
Data Recovery
28. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Workaround Procedures
Business Continuity Program
Electronic Vaulting
Vital Record
29. Record history of incident
Declaration
Birthday Attack
Tracking
Time Of Check/Time Of Use
30. To break a business process into separate functions and assign to different people
On-Site
Bridge
Separation Of Duties
User Mode (problem or program state)
31. Converts source code to an executable
Desk Check Test
Aggregation
Compiler
Business Impact Analysis
32. Try a list of words in passwords or encryption keys
Dictionary Attack
Object Oriented Programming (OOP)
Life Cycle of Evidence
Recovery Strategy
33. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Keystroke Logging
Redundant Servers
Restoration
Worldwide Interoperability for Microwave Access (WI-MAX )
34. A collection of data or information that has a name
Business Interruption
Rogue Access Points
Central Processing Unit (CPU)
File
35. Two different keys decrypt the same cipher text
Physical Tampering
Open Mail Relay Servers
Key Clustering
Capability Tables
36. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
IDS Intrusion Detection System
Declaration
Business Impact Analysis
Race Condition
37. Evaluation of a system without prior knowledge by the tester
Blind Testing
Governance
Business Interruption
Entrapment
38. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Wireless Fidelity (Wi-Fi )
Birthday Attack
Business Interruption Insurance
Data Dictionary
39. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Man-In-The-Middle Attack
Incident Manager
Masquerading
Failure Modes and Effect Analysis (FEMA)
40. Subset of operating systems components dedicated to protection mechanisms
Cold Site
Business Continuity Planning (BCP)
Keyed-Hashing For Message Authentication
Security Kernel
41. Another subject cannot see an ongoing or pending update until it is complete
Virtual Memory
Rollback
Threat Agent
Isolation
42. Object based description of a single resource and the permission each subject
Fire Classes
ISO/IEC 27001
Off-Site Storage
Access Control Lists
43. Code breaking - practice of defeating the protective properties of cryptography.
Digital Signature
Activation
Interpreter
Cryptanalysis
44. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Monitor
Running Key
Proxies
Mobile Site
45. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Mobile Recovery
State Machine Model
Replication
Orange Book D Classification
46. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
ITSEC
CobiT
Admissible
Criminal Law
47. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Remote Access Trojan
Top Secret
Classification
Centralized Access Control Technologies
48. Unused storage capacity
Slack Space
Plain Text
Data Diddler
Centralized Access Control Technologies
49. Mitigate damage by isolating compromised systems from the network.
Accountability
Containment
Fragmented Data
Distributed Denial Of Service
50. System directed mediation of access with labels
Mandatory
Due Care
Spam
True Attack Stimulus