SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Safeguard
Convincing
Reference Monitor
Bridge
2. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Asymmetric
Coaxial Cable
Data Recovery
Concatenation
3. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Common Criteria
Noise
Modification
TCSEC (Orange Book)
4. Disruption of operation of an electronic device due to a competing electromagnetic field.
EMI
Bumping
Marking
Electrostatic Discharge
5. Control category- to discourage an adversary from attempting to access
Deterrent
Redundant Array Of Independent Drives (RAID)
Operating
User
6. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Buffer Overflow
Walk Though
Firewalls
Authentication
7. Control category - more than one control on a single asset
Compensating
Classification
False Negative
CPU Cache
8. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
One Time Pad
Full Test (Full Interruption)
Infrastructure
Code
9. Provides a physical cross connect point for devices.
TNI (Red Book)
Patch Panels
Cross-Site Scripting
Fire Detection
10. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. To stop damage from spreading
Containment
Sharing
Parallel Test
Architecture
12. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Object
Hard Disk
Control Type
Call Tree
13. Control category- to record an adversary's actions
SQL Injection
Mixed Law System
Detective
Deadlock
14. Summary of a communication for the purpose of integrity
Plain Text
Message Digest
Memory Management
Cross Certification
15. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Firmware
Business Impact Assessment (BIA)
Site Policy Awareness
Tar Pits
16. Object based description of a system or a collection of resources
Access Control Matrix
Containment
Microwave
False Negative
17. The study of cryptography and cryptanalysis
Integrated Test
Infrastructure
Access Control Lists
Cryptology
18. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
TIFF (Tagged Image File Format)
Elements of Negligence
Compensating
Moore's Law
19. A Denial of Service attack that floods the target system with connection requests that are not finalized.
SYN Flooding
Picking
Access Control Lists
Cryptanalysis
20. Unsolicited advertising software
Salami
Adware
Labeling
Trusted Computing Base
21. Part of a transaction control for a database which informs the database of the last recorded transaction
Locard's Principle
Information Owner
Checkpoint
Recovery
22. To start business continuity processes
Hub
Activation
Bumping
Operational Impact Analysis
23. For PKI - to have more than one person in charge of a sensitive function
Multi-Party Control
Need-To-Know
Journaling
Interception
24. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Orange Book C Classification
Cold Site
Virtual Memory
Man-In-The-Middle Attack
25. Objects or programming that looks the different but act same
Polymorphism
Trapdoors (Backdoors) (Maintenance Hooks)
5 Rules Of Evidence
Standalone Test
26. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. A planned or unplanned interruption in system availability.
JPEG (Joint Photographic Experts Group)
Contingency Plan
System Downtime
Patent
28. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Life Cycle of Evidence
Malformed Input
Qualitative
Business Continuity Planning (BCP)
29. Natural occurrence in circuits that are in close proximity
File Shadowing
Network Attached Storage (NAS)
Cipher Text
Interference (Noise)
30. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Restoration
Access Control Lists
Cryptanalysis
Detection
31. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
2-Phase Commit
Fraggle
Acronym for American Standard Code for Information Interchange (ASCII)
Covert Channel
32. OOP concept of a taking attributes from the original or parent
Plaintext
Multi-Tasking
Inheritance
Application Programming Interface
33. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Attacker (Black hat - Hacker)
Business Interruption Insurance
Evidence
TCSEC (Orange Book)
34. A signal suggesting a system has been or is being attacked.
Teardrop
File
Emergency
Alert/Alarm
35. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
User Mode (problem or program state)
E-Mail Spoofing
Multilevel Security System
Checklist Test
36. Process whereby data is removed from active files and other data storage structures
Byte
ITSEC
Orange Book B2 Classification
Deletion
37. One way encryption
Rootkit
Hash Function
Emergency Operations Center (EOC)
Business Continuity Planning (BCP)
38. The technical and risk assesment of a system within the context of the operating environment
Certification
Operating
Enticement
Chain of Custody
39. Scrambled form of the message or data
Off-Site Storage
Convincing
Information Flow Model
Cipher Text
40. Amount of time for restoring a business process or function to normal operations without major loss
Bollard
Admissible
Security Clearance
Maximum Tolerable Downtime (MTD)
41. A collection of information designed to reduce duplication and increase integrity
Data Dictionary
Emergency
Privacy Laws
Databases
42. A database backup type which records at the transaction level
Data Backups
Transients
Voice Over IP (VOIP)
Remote Journaling
43. A system that enforces an access control policy between two networks.
Firewalls
Reference Monitor
Microwave
Redundant Array Of Independent Drives (RAID)
44. An encryption method that has a key as long as the message
Running Key
File Server
Exercise
Method
45. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Replication
Trade Secret
Burn
Privacy Laws
46. DoS - Spoofing - dictionary - brute force - wardialing
Business Recovery Timeline
Access Control Attacks
Warm Site
Lattice
47. Potentially compromising leakage of electrical or acoustical signals.
MOM
Risk
Emanations
Civil Law
48. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Accurate
Fault
Cache
Business Recovery Team
49. Transaction controls for a database - a return to a previous state
Incident
Threads
Rollback
Smurf
50. Momentary loss of power
Standalone Test
Fault
Adware
Vulnerability