SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Subjects will not interact with each other's objects
Non-Interference
Kerberos
System Downtime
Tapping
2. A covert storage channel on the file attribute
Data Hiding
Packet Filtering
Alternate Data Streams (File System Forks)
Network Attached Storage (NAS)
3. An alert or alarm that is triggered when no actual attack has taken place
Fire Detection
Memory Management
Data Diddler
False (False Positive)
4. Recovery alternative - short-term - high cost movable processing location
Mobile Site
Hash Function
Need-To-Know
Key Escrow
5. A electronic attestation of identity by a certificate authority
Digital Certificate
Stopped
TCSEC (Orange Book)
Polyalphabetic
6. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Vulnerability
Internal Use Only
Rogue Access Points
User Mode (problem or program state)
7. Communicate to stakeholders
Cryptology
Debriefing/Feedback
Data Recovery
Highly Confidential
8. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Criminal Law
Rootkit
Walk Though
Atomicity
9. Intellectual property protection for an invention
Legacy Data
Cross Certification
Patent
Qualitative
10. An availability attack - to consume resources to the point of exhaustion
Surge Suppressor
Alert
Denial Of Service
Spam
11. A programming device use in development to circumvent controls
Cross-Site Scripting
EMI
Trapdoors (Backdoors) (Maintenance Hooks)
Strong Authentication
12. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Data Backups
Incident Response
Domain
Computer System Evidence
13. A technology that reduces the size of a file.
Structured Walkthrough
Territoriality
Compression
Key Management
14. A protocol for the efficient transmission of voice over the Internet
Attacker (Black hat - Hacker)
Voice Over IP (VOIP)
Elements of Negligence
Business Interruption
15. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Business Unit Recovery
Shadowing (file shadowing)
Waterfall
TEMPEST
16. Natural or human-readable form of message
Multi-Programming
Administrative Laws
Plain Text
Plaintext
17. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
TNI (Red Book)
Worm
Business Records
Business Interruption
18. Unsolicited commercial email
Administrative Laws
Sampling
Spam
Non-Interference
19. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Effort/time needed to overcome a protective measure
Byte Level Deletion
Work Factor
Plaintext
Fault
21. A program with an inappropriate second purpose
Discretionary Access Control (DAC)
Risk
Trojan Horse
Marking
22. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Worm
Fire Suppression
Application Programming Interface
Initialization Vector
23. A database that contains the name - type - range of values - source and authorization for access for each data element
Change Control
Information Technology Security Evaluation Criteria - ITSEC
Distributed Processing
Data Dictionary
24. A state where two subjects can access the same object without proper mediation
Blackout
Race Condition
Data Leakage
Databases
25. Small data files written to a user's hard drive by a web server.
Mantrap (Double Door System)
Recovery Time Objectives
Cookie
Multi-Party Control
26. To break a business process into separate functions and assign to different people
Business Records
Separation Of Duties
Asymmetric
Orange Book A Classification
27. Two different keys decrypt the same cipher text
Examples of non-technical security components
Deletion
Data Warehouse
Key Clustering
28. Mathematical function that determines the cryptographic operations
Framework
Algorithm
Certification
Alarm Filtering
29. A back up type - where the organization has excess capacity in another location.
Identification
Alternate Site
Relocation
Distributed Processing
30. Asymmetric encryption of a hash of message
Strategic
Digital Signature
Incident Response Team
Data Backups
31. Joining two pieces of text
Spyware
Hard Disk
Concatenation
Cryptovariable
32. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Byte
Twisted Pair
Multi-Programming
Business Records
33. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Twisted Pair
Copyright
Monitor
Hot Spares
34. The chance that something negative will occur
Risk
Electromagnetic Interference (EMI)
Noise
Emergency Procedures
35. Unsolicited advertising software
Radio Frequency Interference (RFI)
Security Domain
Adware
Distributed Processing
36. Subset of operating systems components dedicated to protection mechanisms
User
Alarm Filtering
Security Kernel
Threat Agent
37. Someone who wants to cause harm
Aggregation
Security Domain
Attacker (Black hat - Hacker)
Public Key Infrastructure (PKI)
38. OOP concept of a distinct copy of the class
Governance
Object
Desk Check Test
Journaling
39. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.
File
Data Backup Strategies
Risk Mitigation
Infrastructure
40. Object based description of a system or a collection of resources
Revocation
Encipher
Call Tree
Access Control Matrix
41. An unintended communication path
Keyed-Hashing For Message Authentication
Buffer Overflow
Covert Channel
Mandatory Access Control (MAC)
42. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Cross-Site Scripting
Replication
Plan Maintenance Procedures
False Attack Stimulus
43. Real-time data backup ( Data Mirroring)
Botnet
Standard
Database Shadowing
Atomicity
44. Scrambled form of the message or data
Cookie
Data Backup Strategies
Cipher Text
Payload
45. Regular operations are stopped and where processing is moved to the alternate site.
Full-Interruption test
JPEG (Joint Photographic Experts Group)
Copyright
E-Mail Spoofing
46. Recording the Who What When Where How of evidence
Polyalphabetic
Common Law
Off-Site Storage
Chain Of Custody
47. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Mirroring
Common Criteria
Labeling
IP Fragmentation
48. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Isolation
File Extension
Authorization
Trusted Computing Base
49. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Source Routing Exploitation
Bit
Business Impact Analysis
Job Rotation
50. Recovery alternative which outsources a business function at a cost
Electronic Vaulting
Off-Site Storage
Mantrap (Double Door System)
Service Bureau