SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Power surge
Accreditation
Honeynet
Need-To-Know
Electrostatic Discharge
2. Unauthorized access of network devices.
Modems
Physical Tampering
Due Care
Information Owner
3. Recovery alternative - short-term - high cost movable processing location
Database Replication
Mobile Site
Basics Of Secure Design
Trademark
4. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Bit
Countermeasure
Site Policy Awareness
Permutation /Transposition
5. Responsibility for actions
Liability
Distributed Denial Of Service
The ACID Test
Embedded
6. A collection of information designed to reduce duplication and increase integrity
Brute Force
Critical Functions
Radio Frequency Interference (RFI)
Databases
7. A planned or unplanned interruption in system availability.
CPU Cache
System Downtime
Keystroke Logging
Separation Of Duties
8. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Bit
Remanence
Data Dictionary
The ACID Test
9. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Separation Of Duties
Tort
Cold Site
Technical Access Controls
10. Long term knowledge building
Firewalls
Dangling Pointer
Kernel
Education
11. Reduces causes of fire
Teardrop
Containment
Fire Prevention
Critical Records
12. One way encryption
Archival Data
Brouter
Dangling Pointer
Hash Function
13. Uncheck data input which results in redirection
Denial Of Service
HTTP Response Splitting
Brouter
Hard Disk
14. Scrambled form of the message or data
Due Diligence
2-Phase Commit
Desk Check Test
Cipher Text
15. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
TNI (Red Book)
High-Risk Areas
Information Technology Security Evaluation Criteria - ITSEC
Virtual Memory
16. Evidence must be: admissible - authentic - complete - accurate - and convincing
Steganography
Classification
5 Rules Of Evidence
Content Dependent Access Control
17. Subjects will not interact with each other's objects
MOM
Mission-Critical Application
Non-Interference
Framework
18. To assert or claim credentialing to an authentication system
Radio Frequency Interference (RFI)
Identification
Operational Test
Recovery Point Objective (RPO)
19. A secure connection to another network.
Gateway
Inrush Current
Hearsay Evidence
Information Technology Security Evaluation Criteria - ITSEC
20. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Administrative Laws
Mock Disaster
Data Owner
Ethics
21. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Disk Mirroring
Public Key Infrastructure (PKI)
Data Backups
Binary
22. Requirement to take time off
Patch Panels
Keyed-Hashing For Message Authentication
Plan Maintenance Procedures
Mandatory Vacations
23. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Masked/Interruptible
Redundant Servers
IP Fragmentation
Access Control Attacks
24. Maximum tolerance for loss of certain business function - basis of strategy
Intrusion Prevention Systems
Recovery Time Objectives
Bumping
Certification Authority
25. A device that sequentially switches multiple analog inputs to the output.
Complete
Multiplexers
Rollback
Analysis
26. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. Program that inappropriately collects private data or activity
Spyware
TEMPEST
Fire Prevention
Durability
28. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Degauss
Cryptovariable
Remote Journaling
Brute Force
29. Unsolicited commercial email
Alternate Data Streams (File System Forks)
Spam
Modification
Blackout
30. Written core statements that rarely change
War Driving
Policy
Enticement
Authentication
31. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Top Secret
Structured Walk-Through Test
Due Diligence
Custodian
32. Moving the alphabet intact a certain number spaces
Shift Cipher (Caesar)
Watermarking
Modification
True Attack Stimulus
33. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Triage
Byte Level Deletion
Object
Total Risk
34. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Reference Monitor
Business Impact Analysis
Decipher
Byte Level Deletion
35. Forgery of the sender's email address in an email header.
Hacker
Covert Channel
Database Shadowing
E-Mail Spoofing
36. Recovery alternative - everything needed for the business function - except people and last backup
Hot Site
Data Warehouse
Strong Authentication
Reciprocal Agreement
37. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Simulation Test
Incident Handling
Call Tree
Standalone Test
38. A trusted issuer of digital certificates
Labeling
Identification
Certification Authority
Physical Tampering
39. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Administrative Laws
Trapdoors (Backdoors) (Maintenance Hooks)
Data Dictionary
Mobile Recovery
40. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
TNI (Red Book)
Patent
File Server
Metadata
41. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Supervisor Mode (monitor - system - privileged)
Integrated Test
War Dialing
Copyright
42. Information about data or records
Metadata
Central Processing Unit (CPU)
Directive
Emergency
43. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Generator
Interference (Noise)
Embedded Systems
Common Criteria
44. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Data Integrity
Database Shadowing
Crisis
Analysis
45. A system designed to prevent unauthorized access to or from a private network.
Discretionary
Firewall
Activation
Orange Book A Classification
46. Real-time - automatic and transparent backup of data.
Remote Journaling
Byte Level Deletion
Journaling
Data Dictionary
47. Process of statistically testing a data set for the likelihood of relevant information.
Data Leakage
Enticement
Quantitative Risk Analysis
Sampling
48. To execute more than one instruction at an instant in time
Orange Book C2 Classification
Masquerading
Multi-Processing
Parallel Test
49. Mathematical function that determines the cryptographic operations
Virtual Memory
5 Rules Of Evidence
Modification
Algorithm
50. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Quantitative Risk Analysis
Databases
Keystroke Logging
Compensating