SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
TEMPEST
Codec
Copyright
Standalone Test
2. More than one process in the middle of executing at a time
Multi-Tasking
Business Unit Recovery
Botnet
Binary
3. Sphere of influence
Detection
Domain
Directive
Checklist Test (desk check)
4. Recovery alternative - complete duplication of services including personnel
Emanations
Mirrored Site
ff Site
Binary
5. Those who initiate the attack
Tar Pits
Data Dictionary
Policy
Threat Agent
6. To reduce fire
Fire Suppression
Emergency Procedures
Accountability
Bumping
7. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Primary Storage
Tort
Data Leakage
Electromagnetic Interference (EMI)
8. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Emergency Procedures
Residual Risk
Denial Of Service
Liability
9. Subjects will not interact with each other's objects
Non-Interference
Polymorphism
Honeynet
Encipher
10. One entity with two competing allegiances
Access Control Matrix
Computer System Evidence
Trapdoors (Backdoors) (Maintenance Hooks)
Conflict Of Interest
11. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Off-Site Storage
Voice Over IP (VOIP)
Site Policy Awareness
Salami
12. To segregate for the purposes of labeling
Compartmentalize
Payload
Residual Risk
Orange Book C2 Classification
13. A physical enclosure for verifying identity before entry to a facility
The ACID Test
Mantrap (Double Door System)
Rollback
Failure Modes and Effect Analysis (FEMA)
14. Weakness or flaw in an asset
Cookie
Vulnerability
Spyware
Hard Disk
15. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Rollback
Identification
File Server
Corrective
16. A control after attack
ISO/IEC 27002
Sampling
Cryptography
Countermeasure
17. A subnetwork with storage devices servicing all servers on the attached network.
System Life Cycle
Storage Area Network (SAN)
Trade Secret
Acronym for American Standard Code for Information Interchange (ASCII)
18. A set of laws that the organization agrees to be bound by
False (False Positive)
ISO/IEC 27002
Administrative Law
Recovery Time Objectives
19. Recovery alternative which includes cold site and some equipment and infrastructure is available
Risk Assessment
Recovery Period
Business Continuity Steering Committee
Warm Site
20. A type of attack involving attempted insertion - deletion or altering of data.
Fire Prevention
Modification
Data Dictionary
Tracking
21. High degree of visual control
Surveillance
Framework
Preemptive
Highly Confidential
22. Vehicle or tool that exploits a weakness
Redundant Array Of Independent Drives (RAID)
One Time Pad
Education
Threats
23. Process of statistically testing a data set for the likelihood of relevant information.
Shielding
Transients
Hot Spares
Sampling
24. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Forward Recovery
Classification
Sniffing
Interpreter
25. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Business Continuity Steering Committee
Quantitative
Tapping
Recovery Point Objective (RPO)
26. A distributed system's transaction control that requires updates to complete or rollback
Risk Mitigation
2-Phase Commit
Record Level Deletion
Internal Use Only
27. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Log
Initialization Vector
Guidelines
Debriefing/Feedback
28. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Near Site
Off-Site Storage
Cipher Text
Smurf
29. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Restoration
Deterrent
Criminal Law
File Shadowing
30. Mathematical function that determines the cryptographic operations
Incident Manager
System Downtime
Fire Classes
Algorithm
31. A protocol for the efficient transmission of voice over the Internet
Voice Over IP (VOIP)
Encapsulation
Incident Manager
Encryption
32. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Simulation
Log
Polyalphabetic
Detection
33. A hash that has been further encrypted with a symmetric algorithm
Parallel Test
Durability
Deterrent
Keyed-Hashing For Message Authentication
34. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Data Diddler
Shielding
Database Replication
Alarm Filtering
35. State of computer - to be running a process
Operating
Job Training
Intrusion Detection Systems
Warm Site
36. An asymmetric cryptography mechanism that provides authentication.
User
Compartmentalize
Digital Signature
Guidelines
37. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Encipher
Object Reuse
Man-In-The-Middle Attack
Computer System Evidence
38. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Surge
Resumption
Full Test (Full Interruption)
MOM
39. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Parallel Test
5 Rules Of Evidence
IP Fragmentation
Security Blueprint
40. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
2-Phase Commit
Pointer
Distributed Processing
Preemptive
41. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Ethics
Checklist Test
Accreditation
Security Kernel
42. Inappropriate data
Business Continuity Program
Slack Space
Malformed Input
Disaster Recovery Teams (Business Recovery Teams)
43. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Hijacking
Cold Site
Keyed-Hashing For Message Authentication
Administrative Laws
44. Joining two pieces of text
Concatenation
Business Impact Analysis
Stopped
Preemptive
45. A mobilized resource purchased or contracted for the purpose of business recovery.
Deadlock
2-Phase Commit
Mobile Recovery
Detection
46. Total number of keys available that may be selected by the user of a cryptosystem
Key Space
Denial Of Service
Investigation
Corrective
47. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Structured Walkthrough
Residual Risk
Private Branch Exchange (PBX)
Exercise
48. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Walk Though
Residual Risk
Worldwide Interoperability for Microwave Access (WI-MAX )
Tar Pits
49. Impossibility of denying authenticity and identity
Non-Repudiation
TNI (Red Book)
Residual Risk
Checklist Test
50. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
Criminal Law
TIFF (Tagged Image File Format)
Intrusion Prevention Systems
Honeypot