SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Business Impact Analysis
Faraday Cage/ Shield
Certification Authority
Standalone Test
2. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Fault Tolerance
True Attack Stimulus
Byte
Mission-Critical Application
3. A shield against leakage of electromagnetic signals.
Trademark
Non-Repudiation
Faraday Cage/ Shield
Executive Succession
4. Someone who want to know how something works - typically by taking it apart
Emergency
Slack Space
Capability Tables
Hacker
5. Effort/time needed to overcome a protective measure
Admissible
Work Factor
Classification
Encryption
6. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Decipher
Privacy Laws
Basics Of Secure Design
Legacy Data
7. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Bit
Technical Access Controls
Standalone Test
Total Risk
8. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Data Leakage
System Downtime
Dangling Pointer
Embedded Systems
9. Intellectual property protection for an confidential and critical process
Disaster
Data Leakage
Multi-Programming
Trade Secret
10. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Brownout
Authentic
Life Cycle of Evidence
Security Domain
11. A protocol for the efficient transmission of voice over the Internet
3 Types of harm Addressed in computer crime laws
Voice Over IP (VOIP)
Least Privilege
DR Or BC Coordinator
12. Memory management technique that allows two processes to run concurrently without interaction
Technical Access Controls
Injection
Mobile Site
Protection
13. Specific format of technical and physical controls that support the chosen framework and the architecture
Infrastructure
Multi-Party Control
Spyware
Wait
14. Power surge
Data Warehouse
Patch Panels
Walk Though
Electrostatic Discharge
15. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Total Risk
Fire Prevention
Workaround Procedures
Memory Management
16. Long term knowledge building
Compression
Analysis
False Negative
Education
17. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Common Law
Data Marts
Parallel Test
ISO/IEC 27001
18. A set of laws that the organization agrees to be bound by
Interpreter
Administrative Law
Alarm Filtering
Redundant Servers
19. Unauthorized wireless network access device.
System Downtime
Rogue Access Points
Site Policy
Technical Access Controls
20. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
Discretionary Access Control (DAC)
Encapsulation
Operational Exercise
5 Rules Of Evidence
21. Event(s) that cause harm
Incident
Redundant Servers
Database Replication
Infrastructure
22. Natural occurrence in circuits that are in close proximity
Alert
Total Risk
Interference (Noise)
Identification
23. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Fraggle
Masked/Interruptible
Sharing
Deleted File
24. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Detection
Critical Records
Business Interruption
Deleted File
25. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Data Marts
Vulnerability
Source Routing Exploitation
Corrective
26. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Uninterruptible Power Supply (UPS)
Incident
Mantrap (Double Door System)
Steganography
27. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Coaxial Cable
System Life Cycle
Business Recovery Team
Dictionary Attack
28. A choice in risk management - to convince another to assume risk - typically by payment
Virus
Transfer
Information Risk Management (IRM)
Locard's Principle
29. To break a business process into separate functions and assign to different people
Mandatory Access Control (MAC)
Encipher
Separation Of Duties
Code
30. Forging of an IP address.
Buffer Overflow
IP Address Spoofing
Mandatory Access Control (MAC)
Fault
31. An administrative unit or a group of objects and subjects controlled by one reference monitor
War Dialing
Confidence Value
Security Domain
Cross-Site Scripting
32. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Code
Cryptovariable
Disk Mirroring
Residual Risk
33. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Authentic
Certification
Emanations
Pointer
34. Intellectual property management technique for identifying after distribution
Emergency
Watermarking
Cryptography
Hub
35. Written core statements that rarely change
Executive Succession
Brownout
Policy
Corrective
36. Record history of incident
Inrush Current
Multi-Programming
Tracking
Asymmetric
37. A choice in risk management - to implement a control that limits or lessens negative effects
3 Types of harm Addressed in computer crime laws
Mitigate
Call Tree
Quantitative
38. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Custodian
Simulation
Alternate Data Streams (File System Forks)
Trade Secret
39. For PKI - to store another copy of a key
Key Escrow
Standard
Locard's Principle
Business Impact Assessment (BIA)
40. Pertaining to law - no omissions
Patch Management
Alternate Data Streams (File System Forks)
Complete
Compartmentalize
41. Location where coordination and execution of BCP or DRP is directed
Faraday Cage/ Shield
Dangling Pointer
Mandatory Access Control (MAC)
Emergency Operations Center (EOC)
42. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Alert
Side Channel Attack
Object Oriented Programming (OOP)
Information Flow Model
43. A process state - to be executing a process on the CPU
Access Control Lists
Running
Structured Walkthrough
Brownout
44. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Burn
Active Data
Digital Certificate
Memory Management
45. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Primary Storage
Control
Qualitative
Business Continuity Program
46. A planned or unplanned interruption in system availability.
Site Policy Awareness
System Downtime
HTTP Response Splitting
Denial Of Service
47. Eavesdropping on network communications by a third party.
Honeynet
Labeling
Sniffing
Warm Site
48. Scrambled form of the message or data
Infrastructure
Cipher Text
Chain Of Custody
Coaxial Cable
49. People protect their domain
Territoriality
Cipher Text
Vulnerability
Intrusion Prevention Systems
50. Control category- to give instructions or inform
Data Hiding
Due Diligence
Risk Assessment / Analysis
Directive