SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Responsibility of a user for the actions taken by their account which requires unique identification
User Mode (problem or program state)
Ring Protection
Accountability
Mirroring
2. System directed mediation of access with labels
Critical Infrastructure
Slack Space
Mandatory
Multi-Party Control
3. Control category- to give instructions or inform
Business Records
Emergency Procedures
Directive
Classification
4. Eavesdropping on network communications by a third party.
Decipher
Sniffing
Wireless Fidelity (Wi-Fi )
Spiral
5. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Data Backups
Aggregation
Journaling
Debriefing/Feedback
6. The chance that something negative will occur
Risk
Byte Level Deletion
False Negative
3 Types of harm Addressed in computer crime laws
7. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Failure Modes and Effect Analysis (FEMA)
War Driving
Central Processing Unit (CPU)
Plaintext
8. A record that must be preserved and available for retrieval if needed.
Multi-Programming
Vital Record
Full Test (Full Interruption)
Common Law
9. Recording activities at the keyboard level
Keystroke Logging
Reciprocal Agreement
Bumping
Guidelines
10. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Strategic
Incident Response
Ring Protection
Time Of Check/Time Of Use
11. Written suggestions that direct choice to a few alternatives
Guidelines
Life Cycle of Evidence
Deadlock
Mobile Site
12. Unauthorized wireless network access device.
Orange Book B1 Classification
Rogue Access Points
Distributed Processing
Intrusion Detection Systems
13. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Object Oriented Programming (OOP)
Business Continuity Program
Analysis
File Server
14. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Risk Assessment
Running Key
Disk Mirroring
Administrative Access Controls
15. The technical and risk assesment of a system within the context of the operating environment
Mandatory
Structured Walk-Through Test
Workaround Procedures
Certification
16. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Control Category
Operational Exercise
Salami
Fragmented Data
17. Effort/time needed to overcome a protective measure
Object
War Dialing
Work Factor
Business Unit Recovery
18. Methodical research of an incident with the purpose of finding the root cause
Compiler
Assembler
Remanence
Investigation
19. Process of statistically testing a data set for the likelihood of relevant information.
The ACID Test
Sampling
Change Control
File Extension
20. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Job Training
Polymorphism
Business Impact Analysis
Computer System Evidence
21. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Shift Cipher (Caesar)
Acronym for American Standard Code for Information Interchange (ASCII)
Waterfall
3 Types of harm Addressed in computer crime laws
22. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Firewalls
Alternate Site
Fraggle
Picking
23. Record history of incident
Digital Signature
Tracking
Administrative Access Controls
Process Isolation
24. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
War Dialing
Triage
Polyalphabetic
Fire Detection
25. Encryption system using shared key/private key/single key/secret key
Symmetric
Fragmented Data
Business Interruption
Disaster
26. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Burn
Interception
Incident Manager
File Server
27. For PKI - to store another copy of a key
Key Escrow
TEMPEST
Copyright
Site Policy
28. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Bit
Common Criteria
Inrush Current
Noise
29. Initial surge of current
Separation Of Duties
Inrush Current
Durability
Emergency Operations Center (EOC)
30. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Kerberos
Threads
Data Backup Strategies
Common Criteria
31. People who interact with assets
User
Infrastructure
Disk Mirroring
File Shadowing
32. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Emanations
Multi-Programming
Incident
Business Interruption Insurance
33. A trusted issuer of digital certificates
Non-Discretionary Access Control
Access Control Matrix
Strong Authentication
Certification Authority
34. A set of laws that the organization agrees to be bound by
Administrative Law
Recovery Strategy
Mirroring
The ACID Test
35. Quantity of risk remaining after a control is applied
Residual Risk
Activation
CobiT
Initialization Vector
36. Intellectual property protection for an invention
Patent
Business Recovery Timeline
5 Rules Of Evidence
Multi-Processing
37. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Walk Though
Waterfall
Data Recovery
Business Unit Recovery
38. Organized group of compromised computers
Botnet
Identification
Modems
IP Address Spoofing
39. Object reuse protection and auditing
Intrusion Prevention Systems
Orange Book C2 Classification
Threat Agent
Trusted Computing Base
40. A signal suggesting a system has been or is being attacked.
Record Level Deletion
Basics Of Secure Design
Alert/Alarm
Orange Book D Classification
41. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Shielding
Spyware
Site Policy Awareness
Recovery Period
42. OOP concept of a template that consist of attributes and behaviors
Certificate Revocation List (CRL)
Deletion
Class
Waterfall
43. Malware that makes many small changes over time to a single data point or system
Multiplexers
Inheritance
Stopped
Salami
44. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Disaster Recovery Plan
Business Unit Recovery
Binary
Basics Of Secure Design
45. A device that provides the functions of both a bridge and a router.
Business Records
Business Impact Analysis
Sequence Attacks
Brouter
46. A disturbance that degrades performance of electronic devices and electronic communications.
Radio Frequency Interference (RFI)
Information Owner
Boot (V.)
ISO/IEC 27001
47. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Journaling
Multi-Core
Elements of Negligence
Preemptive
48. Low level - pertaining to planning
Symmetric
Trapdoors (Backdoors) (Maintenance Hooks)
Trade Secret
Tactical
49. A database that contains the name - type - range of values - source and authorization for access for each data element
Eavesdropping
Data Dictionary
Private Branch Exchange (PBX)
Fragmented Data
50. A distributed system's transaction control that requires updates to complete or rollback
Non-Repudiation
Cipher Text
Side Channel Attack
2-Phase Commit