SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
ff Site
False Attack Stimulus
Shadowing (file shadowing)
Tactical
2. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.
Risk Mitigation
Targeted Testing
ff Site
Executive Succession
3. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Database Shadowing
Method
Journaling
Service Bureau
4. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Reduction of voltage by the utility company for a prolonged period of time
Brownout
Generator
Business Interruption
Recovery
6. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Threads
TEMPEST
Alternate Site
Emergency Procedures
7. Effort/time needed to overcome a protective measure
Work Factor
DR Or BC Coordinator
Machine Language (Machine Code)
Running
8. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Restoration
Compensating
Deleted File
Electronic Vaulting
9. Written core statements that rarely change
Policy
Civil Law
Journaling
Desk Check Test
10. Eavesdropping on network communications by a third party.
ff Site
Tapping
Trapdoors (Backdoors) (Maintenance Hooks)
System Downtime
11. Line by line translation from a high level language to machine code
Surge
Recovery Time Objectives
Access Control Lists
Interpreter
12. Code making
Alarm Filtering
Salami
Critical Infrastructure
Cryptography
13. Natural or human-readable form of message
Denial Of Service
Plain Text
Chain of Custody
Private Branch Exchange (PBX)
14. Reprogrammable basic startup instructions
Reciprocal Agreement
Kernel
Bollard
Firmware
15. Act of luring an intruder and is legal.
Debriefing/Feedback
Enticement
Vulnerability
Discretionary Access Control (DAC)
16. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Denial Of Service
3 Types of harm Addressed in computer crime laws
Information Technology Security Evaluation Criteria - ITSEC
Territoriality
17. Eavesdropping on network communications by a third party.
Operational Exercise
Mandatory
Security Kernel
Sniffing
18. Intellectual property protection for an confidential and critical process
File
Trade Secret
Data Owner
Risk
19. Real-time data backup ( Data Mirroring)
Database Shadowing
Memory Management
Honeypot
Criminal Law
20. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Declaration
Recovery Strategy
True Attack Stimulus
Lattice
21. False memory reference
Layering
Dangling Pointer
Multi-Party Control
System Life Cycle
22. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Triage
Sharing
Satellite
Basics Of Secure Design
23. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Incident
SQL Injection
Method
System Life Cycle
24. Dedicated fast memory located on the same board as the CPU
CPU Cache
Alarm Filtering
Replication
Test Plan
25. A computer designed for the purpose of studying adversaries
Authentication
Targeted Testing
Strategic
Honeypot
26. To load the first piece of software that starts a computer.
Reference Monitor
Examples of technical security components
Boot (V.)
Cross-Site Scripting
27. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Generator
Capability Tables
Workaround Procedures
Highly Confidential
28. Hiding the fact that communication has occurred
Locard's Principle
Recovery Point Objective (RPO)
Steganography
Evidence
29. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Simulation Test
Countermeasure
Ring Protection
Atomicity
30. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Directive
Alternate Data Streams (File System Forks)
Elements of Negligence
Bollard
31. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Proxies
Highly Confidential
Archival Data
Collisions
32. Recovery alternative - complete duplication of services including personnel
Mirrored Site
Embedded
Virus
Near Site
33. The core logic engine of an operating system which almost never changes
Detective
Checklist Test
Kernel
Central Processing Unit (CPU)
34. A collection of information designed to reduce duplication and increase integrity
Databases
Labeling
Recovery
Basics Of Secure Design
35. Recovery alternative - everything needed for the business function - except people and last backup
Hot Site
Storage Area Network (SAN)
Workaround Procedures
UPS
36. A temporary public file to inform others of a compromised digital certificate
Change Control
Residual Data
Certificate Revocation List (CRL)
UPS
37. Intellectual property management technique for identifying after distribution
Watermarking
Time Of Check/Time Of Use
Least Privilege
Rollback
38. A backup of data located where staff can gain access immediately
Policy
On-Site
Deletion
Man-In-The-Middle Attack
39. Disruption of operation of an electronic device due to a competing electromagnetic field.
Deadlock
Key Escrow
EMI
Chain Of Custody
40. A description of a database
CPU Cache
Data Dictionary
Privacy Laws
Framework
41. Periodic - automatic and transparent backup of data in bulk.
Operational Test
Faraday Cage/ Shield
Plain Text
Electronic Vaulting
42. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Site Policy Awareness
Adware
Sequence Attacks
Strong Authentication
43. Hardware or software that is part of a larger system
Inrush Current
Time Of Check/Time Of Use
Remote Journaling
Embedded
44. Hitting a filed down key in a lock with a hammer to open without real key
Education
Bumping
Access Control Matrix
Compensating
45. To move from location to location - keeping the same function
Trusted Computing Base
Job Rotation
Side Channel Attack
Accurate
46. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Operating
Control Category
Operational Impact Analysis
Virus
47. A hash that has been further encrypted with a symmetric algorithm
Spiral
Kerberos
Workaround Procedures
Keyed-Hashing For Message Authentication
48. Policy or stated actions
Due Care
Multi-Programming
Compression
File Extension
49. A system designed to prevent unauthorized access to or from a private network.
Electronic Vaulting
Firewall
Tracking
Critical Functions
50. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Worldwide Interoperability for Microwave Access (WI-MAX )
Race Condition
Data Owner
Framework