SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Common Criteria
Standalone Test
Private Branch Exchange (PBX)
Mission-Critical Application
2. An unintended communication path
Exercise
Procedure
Least Privilege
Covert Channel
3. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Cookie
Pervasive Computing and Mobile Computing Devices
Data Dictionary
Accurate
4. Is secondhand and usually not admissible in court
Certification
Replication
Hearsay Evidence
File Sharing
5. A state for operating system tasks only
Integrated Test
Call Tree
Steganography
Supervisor Mode (monitor - system - privileged)
6. More than one process in the middle of executing at a time
Mitigate
Civil Or Code Law
Private Branch Exchange (PBX)
Multi-Tasking
7. Key
Authentic
Cryptovariable
Alarm Filtering
Domain
8. A Trojan horse with the express underlying purpose of controlling host from a distance
Forward Recovery
Incident
Remote Access Trojan
Data Leakage
9. Potentially compromising leakage of electrical or acoustical signals.
Emanations
Alert/Alarm
Business Unit Recovery
Certification Authority
10. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Site Policy Awareness
Business Continuity Planning (BCP)
Simulation Test
Proxies
11. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Declaration
Inrush Current
Journaling
Multi-Tasking
12. A program with an inappropriate second purpose
Trojan Horse
Accurate
Non-Repudiation
Damage Assessment
13. To execute more than one instruction at an instant in time
Multi-Processing
Certification
Business Continuity Planning (BCP)
Workaround Procedures
14. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Open Mail Relay Servers
Man-In-The-Middle Attack
Log
Standalone Test
15. A design methodology which executes in a linear one way fashion
Education
Voice Over IP (VOIP)
Waterfall
Activation
16. For PKI - decertify an entities certificate
Layering
Disaster Recovery Plan
Revocation
Threads
17. Induces a crime - tricks a person - and is illegal
Computer Forensics
Entrapment
Supervisor Mode (monitor - system - privileged)
Spiral
18. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Plain Text
Stopped
Uninterruptible Power Supply (UPS)
Education
19. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Business Unit Recovery
CobiT
Data Diddler
Recovery Time Objectives
20. Natural occurrence in circuits that are in close proximity
Routers
Object
Interference (Noise)
Examples of technical security components
21. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Rollback
Encryption
Mission-Critical Application
Mock Disaster
22. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Smurf
HTTP Response Splitting
Redundant Array Of Independent Drives (RAID)
Preemptive
23. Intellectual property protection for an invention
Sequence Attacks
Patent
Privacy Laws
Pervasive Computing and Mobile Computing Devices
24. Forging of an IP address.
IP Address Spoofing
Running Key
Change Control
Computer System Evidence
25. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Centralized Access Control Technologies
Business Unit Recovery
True Attack Stimulus
Side Channel Attack
26. A control before attack
Byte
Degauss
Virtual Memory
Safeguard
27. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Cross Training
Journaling
Digital Signature
Memory Management
28. The technical and risk assesment of a system within the context of the operating environment
Certification
Simulation
Integrated Test
Identification
29. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Failure Modes and Effect Analysis (FEMA)
ISO/IEC 27002
Administrative Laws
Non-Interference
30. A system that enforces an access control policy between two networks.
Firewalls
ITSEC
Dictionary Attack
Byte Level Deletion
31. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Discretionary Access Control (DAC)
Monitor
Eavesdropping
Business Continuity Steering Committee
32. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Critical Records
War Dialing
Sequence Attacks
Patch Management
33. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Privacy Laws
Data Backups
Intrusion Prevention Systems
Satellite
34. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Identification
Residual Data
Parallel Test
The ACID Test
35. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Chain of Custody
Criminal Law
Detection
Coaxial Cable
36. Code breaking - practice of defeating the protective properties of cryptography.
Microwave
Instance
Switches
Cryptanalysis
37. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Operational
Data Owner
System Life Cycle
Total Risk
38. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Burn
Need-To-Know
Alert
Alternate Data Streams (File System Forks)
39. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
UPS
Teardrop
Business Impact Assessment (BIA)
Microwave
40. RADIUS - TACACS+ - Diameter
Centralized Access Control Technologies
Physical Tampering
Incident Handling
Security Kernel
41. Recognition of an individual's assertion of identity.
Disaster Recovery Tape
Business Recovery Team
Modems
Identification
42. Control category - more than one control on a single asset
Compensating
Trademark
Digital Certificate
Criminal Law
43. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Restoration
Data Recovery
Worldwide Interoperability for Microwave Access (WI-MAX )
Disaster Recovery Plan
44. Planning with a goal of returning to the normal business function
Test Plan
Memory Management
Object
Restoration
45. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Architecture
Secondary Storage
Guidelines
Degauss
46. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Orange Book B2 Classification
Administrative
Threads
System Life Cycle
47. Control category- to give instructions or inform
Multi-Tasking
Directive
Dictionary Attack
Security Clearance
48. OOP concept of a taking attributes from the original or parent
Inheritance
Civil Law
BCP Testing Drills and Exercises
Mantrap (Double Door System)
49. A group or network of honeypots
Honeynet
Spyware
ITSEC
Business Records
50. Intellectual property protection for marketing efforts
Security Clearance
Identification
Trademark
Fire Suppression