SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To set the clearance of a subject or the classification of an object
Labeling
Disaster Recovery Plan
Framework
Steganography
2. Using many alphabets
Radio Frequency Interference (RFI)
Fire Suppression
Control Type
Polyalphabetic
3. Summary of a communication for the purpose of integrity
Framework
Moore's Law
Recovery
Message Digest
4. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Recovery Strategy
Object Oriented Programming (OOP)
Territoriality
Simulation Test
5. A template for the designing the architecture
Security Blueprint
Operational
Threats
Data Marts
6. Property that data is represented in the same manner at all times
Business Continuity Steering Committee
Incident Handling
Consistency
False (False Positive)
7. RADIUS - TACACS+ - Diameter
Running
Wireless Fidelity (Wi-Fi )
Honeynet
Centralized Access Control Technologies
8. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Security Blueprint
Pervasive Computing and Mobile Computing Devices
Access Point
Residual Data
10. Record of system activity - which provides for monitoring and detection.
File Server
Log
Overlapping Fragment Attack
Trapdoors (Backdoors) (Maintenance Hooks)
11. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Access Control Lists
Binary
Moore's Law
Race Condition
12. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Network Attached Storage (NAS)
Business Recovery Timeline
Security Blueprint
Record Level Deletion
13. Memory management technique which allows subjects to use the same resource
Picking
Acronym for American Standard Code for Information Interchange (ASCII)
Surge Suppressor
Sharing
14. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Spam
Exercise
Proxies
Disk Mirroring
15. A secure connection to another network.
Countermeasure
Gateway
Substitution
Asymmetric
16. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Declaration
Operating
Quantitative
Overlapping Fragment Attack
17. One of the key benefits of a network is the ability to share files stored on the server among several users.
Isolation
Patent
File Sharing
Digital Signature
18. Long term knowledge building
The ACID Test
Education
Liability
Control
19. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Due Diligence
Data Hiding
Call Tree
Orange Book B1 Classification
20. Forgery of the sender's email address in an email header.
Log
2-Phase Commit
Technical Access Controls
E-Mail Spoofing
21. False memory reference
Governance
Acronym for American Standard Code for Information Interchange (ASCII)
Dangling Pointer
Repeaters
22. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
Hub
Parallel Test
Damage Assessment
Keyed-Hashing For Message Authentication
23. A subnetwork with storage devices servicing all servers on the attached network.
Network Attached Storage (NAS)
Storage Area Network (SAN)
Orange Book B2 Classification
Quantitative
24. A signal suggesting a system has been or is being attacked.
Alert/Alarm
SYN Flooding
Mirroring
Orange Book B1 Classification
25. The event signaling an IDS to produce an alarm when no attack has taken place
Business Impact Assessment (BIA)
Incident Response Team
False Attack Stimulus
Criminal Law
26. Initial surge of current
Atomicity
Inrush Current
Record Level Deletion
Warm Site
27. The core logic engine of an operating system which almost never changes
Kernel
Distributed Denial Of Service
Disaster Recovery Plan
Tar Pits
28. For PKI - to have more than one person in charge of a sensitive function
Multi-Party Control
Man-In-The-Middle Attack
Storage Area Network (SAN)
Chain of Custody
29. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Eavesdropping
Data Backups
War Driving
Transients
30. Program that inappropriately collects private data or activity
Public Key Infrastructure (PKI)
Algorithm
Eavesdropping
Spyware
31. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Electronic Vaulting
Uninterruptible Power Supply (UPS)
Code
Storage Area Network (SAN)
32. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Failure Modes and Effect Analysis (FEMA)
Brownout
Corrective
Contingency Plan
33. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
The ACID Test
Microwave
Accountability
Countermeasure
34. High level - pertaining to planning
Crisis
Strategic
Quantitative Risk Analysis
Cryptanalysis
35. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Ring Protection
Journaling
Brute Force
Computer Forensics
36. Two different keys decrypt the same cipher text
Business Continuity Program
Internal Use Only
Key Clustering
ITSEC
37. Used to code/decode a digital data stream.
IDS Intrusion Detection System
Plain Text
Data Leakage
Codec
38. OOP concept of an object's abilities - what it does
TNI (Red Book)
Method
Alternate Site
Message Digest
39. All of the protection mechanism in a computer system
Trusted Computing Base
Classification Scheme
Standard
Layering
40. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Source Routing Exploitation
Interception
Plan Maintenance Procedures
Proprietary
41. A software design technique for abstraction of a process
Multiplexers
Routers
Data Backup Strategies
Data Hiding
42. Controls deployed to avert unauthorized and/or undesired actions.
Dictionary Attack
Accreditation
Prevention
Access Control
43. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Executive Succession
Satellite
Mandatory Vacations
Algorithm
44. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Internal Use Only
War Driving
Territoriality
Mixed Law System
45. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Source Routing Exploitation
Worm
Worldwide Interoperability for Microwave Access (WI-MAX )
Operating
46. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Walk Though
Recovery Time Objectives
Off-Site Storage
Multi-Core
47. Inappropriate data
Malformed Input
Picking
Vital Record
Byte Level Deletion
48. Can be statistical (monitor behavior) or signature based (watch for known attacks)
Operational Impact Analysis
Binary
IDS Intrusion Detection System
Alert
49. Claiming another's identity at a physical level
Masquerading
Critical Functions
Rollback
Classification Scheme
50. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Smurf
Hot Site
Restoration
Forensic Copy