SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Information Flow Model
Alternate Data Streams (File System Forks)
Spiral
Strong Authentication
2. Controls deployed to avert unauthorized and/or undesired actions.
Incident Handling
Prevention
ISO/IEC 27001
Orange Book B1 Classification
3. An administrative unit or a group of objects and subjects controlled by one reference monitor
Intrusion Detection Systems
Security Domain
Access Control Lists
File
4. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Due Diligence
Failure Modes and Effect Analysis (FEMA)
Ethics
Transfer
5. Recognition of an individual's assertion of identity.
Data Recovery
Damage Assessment
Identification
Polymorphism
6. Of a system without prior knowledge by the tester or the tested
Side Channel Attack
Common Law
Remanence
Double Blind Testing
7. A Trojan horse with the express underlying purpose of controlling host from a distance
Polymorphism
Remote Access Trojan
Analysis
Procedure
8. To reduce sudden rises in current
Surge Suppressor
Plan Maintenance Procedures
Access Point
Physical Tampering
9. Hitting a filed down key in a lock with a hammer to open without real key
Separation Of Duties
Fire Classes
Analysis
Bumping
10. Short period of low voltage.
Sag/Dip
Databases
Injection
Mirroring
11. Forgery of the sender's email address in an email header.
File Sharing
Alternate Site
Mock Disaster
E-Mail Spoofing
12. Unauthorized wireless network access device.
Evidence
Strong Authentication
Rogue Access Points
Proxies
13. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
User
Watermarking
Entrapment
Checklist Test (desk check)
14. To load the first piece of software that starts a computer.
Disaster Recovery Tape
Alert/Alarm
Brute Force
Boot (V.)
15. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Administrative
CobiT
Faraday Cage/ Shield
Twisted Pair
16. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Bit
Simulation
Byte
Life Cycle of Evidence
17. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Sharing
Data Dictionary
Patch Management
Chain of Custody
18. Eavesdropping on network communications by a third party.
IP Address Spoofing
Convincing
Access Point
Sniffing
19. Subset of operating systems components dedicated to protection mechanisms
War Dialing
Redundant Array Of Independent Drives (RAID)
Security Kernel
Voice Over IP (VOIP)
20. To jump to a conclusion
True Attack Stimulus
Inference
Running Key
Slack Space
21. Less granular organization of controls -
Critical Records
Corrective
Control Type
Patch Management
22. Uses two or more legal systems
Certification Authority
Mixed Law System
Hot Site
Business Recovery Timeline
23. Regular operations are stopped and where processing is moved to the alternate site.
Simulation
Full-Interruption test
Deadlock
Critical Infrastructure
24. The collection and summation of risk data relating to a particular asset and controls for that asset
Noise
Risk Assessment
Acronym for American Standard Code for Information Interchange (ASCII)
Test Plan
25. Mediation of covert channels must be addressed
Recovery Point Objective (RPO)
Information Flow Model
Critical Records
Key Escrow
26. A program that waits for a condition or time to occur that executes an inappropriate activity
Disaster Recovery Tape
Total Risk
Alert/Alarm
Logic Bomb
27. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
On-Site
Simulation
Trade Secret
Voice Over IP (VOIP)
28. People protect their domain
Separation Of Duties
Reciprocal Agreement
Territoriality
Rootkit
29. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Education
Binary
Deadlock
Orange Book A Classification
30. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Data Diddler
Fire Prevention
Recovery Strategy
Analysis
31. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Radio Frequency Interference (RFI)
Concatenation
Checkpoint
Mock Disaster
32. An individuals conduct that violates government laws developed to protect the public
Teardrop
Triage
Criminal Law
Interception
33. Data or interference that can trigger a false positive
Mandatory Access Control (MAC)
Botnet
Noise
Workaround Procedures
34. To smooth out reductions or increases in power
Control Type
Injection
UPS
Firmware
35. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Conflict Of Interest
Cryptovariable
Memory Management
Recovery Period
36. Intellectual property protection for the expression of an idea
Fragmented Data
Legacy Data
Copyright
Microwave
37. Sphere of influence
Satellite
Containment
Domain
Chain of Custody
38. A condition in which neither party is willing to stop their activity for the other to complete
Deadlock
Hub
Blind Testing
Operational
39. Effort/time needed to overcome a protective measure
Civil Or Code Law
Work Factor
E-Mail Spoofing
Data Backup Strategies
40. Actions measured against either a policy or what a reasonable person would do
ff Site
Active Data
Due Diligence
Top Secret
41. OOP concept of an object's abilities - what it does
Cross Training
Satellite
Method
Resumption
42. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Repeaters
Remote Access Trojan
Simulation
Masquerading
43. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Contingency Plan
Notification
Alert
Deletion
44. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Due Diligence
Plaintext
Damage Assessment
ff Site
45. A one way - directed graph which indicates confidentiality or integrity flow
Malformed Input
Lattice
Operational Impact Analysis
Reference Monitor
46. Pertaining to law - no omissions
Checkpoint
Complete
Burn
Firmware
47. To start business continuity processes
Complete
Recovery Point Objective (RPO)
Activation
Radio Frequency Interference (RFI)
48. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Containment
Virtual Memory
Proxies
Plan Maintenance Procedures
49. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Mission-Critical Application
Transients
Digital Signature
Civil Law
50. An event which stops business from continuing.
Incident Response Team
Administrative
Strong Authentication
Disaster