SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Regular operations are stopped and where processing is moved to the alternate site.
Reference Monitor
Isolation
Byte Level Deletion
Full-Interruption test
2. Maintenance procedures outline the process for the review and update of business continuity plans.
Secondary Storage
Plan Maintenance Procedures
Checksum
Near Site
3. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Supervisor Mode (monitor - system - privileged)
Residual Risk
Multi-Programming
Kernel
4. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
E-Mail Spoofing
Computer System Evidence
Phishing
Transfer
5. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
Orange Book A Classification
Key Space
Top Secret
TNI (Red Book)
6. Real-time data backup ( Data Mirroring)
Data Leakage
Threat Agent
Database Shadowing
Running
7. One entity with two competing allegiances
Data Diddler
Inference
Conflict Of Interest
Emergency Operations Center (EOC)
8. Calculation encompassing threats - vulnerabilities and assets
Total Risk
CobiT
Common Law
Faraday Cage/ Shield
9. False memory reference
Failure Modes and Effect Analysis (FEMA)
Dangling Pointer
Transients
Surge
10. Creation distribution update and deletion
Noise
Administrative
Key Management
Key Space
11. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Tar Pits
Secondary Storage
Access Control Matrix
Emanations
12. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Noise
Distributed Processing
Common Law
Information Owner
13. Renders the record inaccessible to the database management system
Firewall
Control
Record Level Deletion
IP Fragmentation
14. Low level - pertaining to planning
Business Unit Recovery
Maximum Tolerable Downtime (MTD)
On-Site
Tactical
15. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. Firewalls - encryption - and access control lists
Authorization
Domain
Chain of Custody
Examples of technical security components
17. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Checkpoint
DR Or BC Coordinator
Common Criteria
Authorization
18. Physical description on the exterior of an object that communicates the existence of a label
Liability
Marking
Honeynet
Spam
19. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Test Plan
Fault Tolerance
Cryptography
Structured Walkthrough
20. Unauthorized access of network devices.
Virtual Memory
Hard Disk
Memory Management
Physical Tampering
21. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Mirroring
Business Recovery Timeline
Denial Of Service
Administrative Access Controls
22. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Injection
Spam
Tort
Code
23. Deals with discretionary protection
Critical Functions
Contact List
Orange Book B2 Classification
Orange Book C Classification
24. Two different keys decrypt the same cipher text
Interference (Noise)
Labeling
Alternate Data Streams (File System Forks)
Key Clustering
25. A program with an inappropriate second purpose
Symmetric
Inrush Current
Trojan Horse
Labeling
26. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
False Negative
Business Continuity Steering Committee
Governance
Birthday Attack
27. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Picking
Legacy Data
Checklist Test (desk check)
Remote Journaling
28. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
2-Phase Commit
Keyed-Hashing For Message Authentication
Corrective
Encryption
29. To smooth out reductions or increases in power
Electronic Vaulting
Threats
Business Recovery Timeline
UPS
30. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Security Blueprint
Cross-Site Scripting
Executive Succession
Warm Site
31. The one person responsible for data - its classification and control setting
Brouter
Information Owner
Hard Disk
Coaxial Cable
32. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Desk Check Test
Orange Book B2 Classification
Business Continuity Planning (BCP)
Message Digest
33. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Interception
Multi-Processor
Data Backup Strategies
CPU Cache
34. The event signaling an IDS to produce an alarm when no attack has taken place
Archival Data
Interception
False Attack Stimulus
Business Recovery Team
35. Hiding the fact that communication has occurred
Sequence Attacks
Internal Use Only
Permutation /Transposition
Steganography
36. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
Object Oriented Programming (OOP)
Restoration
Change Control
37. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Journaling
Durability
Computer Forensics
Administrative Law
38. To load the first piece of software that starts a computer.
Admissible
Boot (V.)
Custodian
System Life Cycle
39. Process whereby data is removed from active files and other data storage structures
Deletion
Binary
Gateway
Recovery Time Objectives
40. Recovery alternative which includes cold site and some equipment and infrastructure is available
Warm Site
Fire Detection
Administrative Law
Steganography
41. A set of laws that the organization agrees to be bound by
Administrative Law
Preemptive
One Time Pad
ff Site
42. A system that enforces an access control policy between two networks.
Backup
Firewalls
False Negative
High-Risk Areas
43. Code making
Pointer
Cryptography
Radio Frequency Interference (RFI)
Due Diligence
44. Unused storage capacity
Highly Confidential
Shift Cipher (Caesar)
Compartmentalize
Slack Space
45. An attack involving the hijacking of a TCP session by predicting a sequence number.
Sequence Attacks
Watermarking
Reference Monitor
Residual Risk
46. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
EMI
Disk Mirroring
Malformed Input
Access Control Lists
47. The principles a person sets for themselves to follow
Risk
Ethics
Tort
Disaster Recovery Tape
48. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Deleted File
Polyalphabetic
Multilevel Security System
Business Records
49. Sudden rise in voltage in the power supply.
Preemptive
Transfer
Privacy Laws
Surge
50. Malware that makes many small changes over time to a single data point or system
Brouter
Salami
Incident Response Team
Eavesdropping