SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Data Integrity
Worldwide Interoperability for Microwave Access (WI-MAX )
Modems
Archival Data
2. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Critical Infrastructure
Policy
User Mode (problem or program state)
Interference (Noise)
3. Intellectual property protection for marketing efforts
Examples of technical security components
Risk
Trademark
Mobile Recovery
4. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
High-Risk Areas
Forward Recovery
Coaxial Cable
Patch Panels
5. The core logic engine of an operating system which almost never changes
Total Risk
Strategic
Kernel
Quantitative
6. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Information Technology Security Evaluation Criteria - ITSEC
Exposure
Civil Or Code Law
Discretionary Access Control (DAC)
7. Pertaining to law - accepted by a court
Plaintext
Vital Record
Admissible
E-Mail Spoofing
8. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Full Test (Full Interruption)
Restoration
Bollard
Satellite
9. Responsibility for actions
Civil Law
Liability
Labeling
Disaster
10. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Identification
Patent
Exercise
Repeaters
11. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Internal Use Only
Bit
Bumping
Physical Tampering
12. System mediation of access with the focus on the context of the request
Digital Signature
Tactical
Content Dependent Access Control
Transfer
13. Asymmetric encryption of a hash of message
Digital Signature
Mantrap (Double Door System)
Recovery
Orange Book D Classification
14. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
File Extension
Governance
Bumping
Burn
15. A control after attack
Countermeasure
Administrative
Substitution
Directive
16. Unauthorized access of network devices.
Access Point
Risk
Trusted Computing Base
Physical Tampering
17. Statistical probabilities of a collision are more likely than one thinks
Birthday Attack
Intrusion Detection Systems
Total Risk
Recovery
18. Written step-by-step actions
Salami
Sag/Dip
Remanence
Procedure
19. A state for operating system tasks only
System Downtime
Brownout
EMI
Supervisor Mode (monitor - system - privileged)
20. Hardware or software that is part of a larger system
Embedded
Debriefing/Feedback
Overlapping Fragment Attack
Business Continuity Program
21. A trusted issuer of digital certificates
Life Cycle of Evidence
Discretionary
Accountability
Certification Authority
22. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Plaintext
Standard
War Driving
Stopped
23. To create a copy of data as a precaution against the loss or damage of the original data.
Forward Recovery
Backup
Digital Signature
War Dialing
24. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Risk Mitigation
Multi-Processor
Honeynet
25. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Overlapping Fragment Attack
Cross Training
Incident Response
Business Recovery Timeline
26. To reduce fire
Fire Suppression
Total Risk
Secondary Storage
Business Impact Assessment (BIA)
27. Recording activities at the keyboard level
ff Site
Activation
Orange Book B1 Classification
Keystroke Logging
28. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Transients
Spam
High-Risk Areas
Database Replication
29. Unused storage capacity
Education
Covert Channel
Slack Space
One Time Pad
30. Outputs within a given function are the same result
Bumping
The ACID Test
File Server
Collisions
31. Amount of time for restoring a business process or function to normal operations without major loss
Data Diddler
Botnet
Primary Storage
Maximum Tolerable Downtime (MTD)
32. Data or interference that can trigger a false positive
DR Or BC Coordinator
Noise
Residual Risk
Spam
33. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Business Recovery Timeline
Test Plan
Hearsay
Examples of non-technical security components
34. Hiding the fact that communication has occurred
Burn
Steganography
Time Of Check/Time Of Use
Call Tree
35. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Public Key Infrastructure (PKI)
Key Escrow
Coaxial Cable
Kernel
36. Measures followed to restore critical functions following a security incident.
IDS Intrusion Detection System
Business Recovery Team
Recovery
Containment
37. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Information Risk Management (IRM)
Standalone Test
Capability Tables
Data Integrity
38. Objects or programming that looks the different but act same
Quantitative Risk Analysis
Cryptology
Multi-Tasking
Polymorphism
39. RADIUS - TACACS+ - Diameter
Checklist Test
Waterfall
TEMPEST
Centralized Access Control Technologies
40. Natural or human-readable form of message
Administrative Laws
File Server
Trojan Horse
Plain Text
41. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Mandatory
Physical Tampering
Quantitative Risk Analysis
Monitor
42. A system designed to prevent unauthorized access to or from a private network.
Firewall
Simulation Test
Complete
Business Interruption
43. System directed mediation of access with labels
Parallel Test
Key Management
Mandatory
Qualitative
44. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
ISO/IEC 27001
Repeaters
Aggregation
Interception
45. A basic level of network access control that is based upon information contained in the IP packet header.
Packet Filtering
Bollard
Technical Access Controls
Targeted Testing
46. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
MOM
Change Control
Maximum Tolerable Downtime (MTD)
Revocation
47. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Denial Of Service
Packet Filtering
Critical Records
Criminal Law
48. Unauthorized wireless network access device.
Trapdoors (Backdoors) (Maintenance Hooks)
Rogue Access Points
State Machine Model
TEMPEST
49. Object reuse protection and auditing
Alert/Alarm
Access Control
Internal Use Only
Orange Book C2 Classification
50. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Classification
Supervisor Mode (monitor - system - privileged)
Full-Interruption test
Discretionary Access Control (DAC)