SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Virus
Spiral
Redundant Servers
Application Programming Interface
2. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Cookie
Directive
File Shadowing
Stopped
3. Written core statements that rarely change
Operational Exercise
Embedded
Durability
Policy
4. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Service Bureau
False Attack Stimulus
Adware
Elements of Negligence
5. Calculation encompassing threats - vulnerabilities and assets
Total Risk
Internal Use Only
Bumping
Orange Book C Classification
6. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Spiral
3 Types of harm Addressed in computer crime laws
Resumption
Security Blueprint
7. Firewalls - encryption - and access control lists
Civil Law
Examples of technical security components
Governance
Administrative Laws
8. A distributed system's transaction control that requires updates to complete or rollback
2-Phase Commit
Honeynet
Embedded Systems
Radio Frequency Interference (RFI)
9. To set the clearance of a subject or the classification of an object
Risk Assessment / Analysis
Recovery
Labeling
Running
10. Malware that makes small random changes to many data points
Least Privilege
Data Diddler
Incident Response Team
Permutation /Transposition
11. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Storage Area Network (SAN)
Repeaters
Near Site
Codec
12. Real-time - automatic and transparent backup of data.
Fire Classes
Patent
Modification
Remote Journaling
13. A documented battle plan for coordinating response to incidents.
Failure Modes and Effect Analysis (FEMA)
Incident Handling
Call Tree
Authentic
14. Another subject cannot see an ongoing or pending update until it is complete
Isolation
Checksum
Non-Discretionary Access Control
Trade Secret
15. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Discretionary Access Control (DAC)
Workaround Procedures
Risk Assessment
Pervasive Computing and Mobile Computing Devices
16. A group or network of honeypots
Total Risk
Test Plan
Metadata
Honeynet
17. Summary of a communication for the purpose of integrity
Full-Interruption test
Switches
Message Digest
Resumption
18. A process state - to be either be unable to run waiting for an external event or terminated
Common Law
Teardrop
Metadata
Stopped
19. To assert or claim credentialing to an authentication system
Identification
Computer System Evidence
Race Condition
Operational
20. Organized group of compromised computers
Replication
Botnet
Mission-Critical Application
Inrush Current
21. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Wait
Residual Risk
Sharing
Recovery Point Objective (RPO)
22. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Alert/Alarm
Eavesdropping
Firewalls
Hot Spares
23. Descrambling the encrypted message with the corresponding key
Dictionary Attack
Decipher
Mirroring
Risk Assessment
24. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Atomicity
Highly Confidential
Threats
Computer Forensics
25. Indivisible - data field must contain only one value that either all transactions take place or none do
Access Control Lists
Transfer
Atomicity
Cipher Text
26. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Key Escrow
Remote Access Trojan
Disaster Recovery Tape
Work Factor
27. The technical and risk assesment of a system within the context of the operating environment
Security Domain
Certification
Object Reuse
Emanations
28. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Restoration
Keystroke Logging
Race Condition
Consistency
29. The connection between a wireless and wired network.
War Dialing
Access Point
Business Impact Assessment (BIA)
Analysis
30. Uncheck data input which results in redirection
Orange Book A Classification
Data Diddler
Investigation
HTTP Response Splitting
31. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Mock Disaster
Mantrap (Double Door System)
Object Oriented Programming (OOP)
Faraday Cage/ Shield
32. Recovery alternative which outsources a business function at a cost
Service Bureau
Structured Walk-Through Test
Brownout
Kernel
33. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
Infrastructure
Malformed Input
SQL Injection
34. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Business Impact Assessment (BIA)
Failure Modes and Effect Analysis (FEMA)
Change Control
Reference Monitor
35. An administrative unit or a group of objects and subjects controlled by one reference monitor
Business Impact Analysis
Infrastructure
Wireless Fidelity (Wi-Fi )
Security Domain
36. A telephone exchange for a specific office or business.
Payload
Bit
Conflict Of Interest
Private Branch Exchange (PBX)
37. Pertaining to law - high degree of veracity
Bumping
Kerckhoff's Principle
Accurate
Database Shadowing
38. Weak evidence
Hearsay
Remote Journaling
Blind Testing
Secondary Storage
39. A device that converts between digital and analog representation of data.
Copyright
Residual Data
Substitution
Modems
40. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Remote Journaling
Risk Mitigation
Analysis
Life Cycle of Evidence
41. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Eavesdropping
Access Point
Injection
Administrative Access Controls
42. Location to perform the business function
Alternate Site
Service Bureau
Wait
Common Law
43. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Computer System Evidence
Monitor
Control
Repeaters
44. Pertaining to law - verified as real
Governance
Labeling
True Attack Stimulus
Authentic
45. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Least Privilege
Business Impact Assessment (BIA)
Business Impact Analysis
High-Risk Areas
46. Unauthorized access of network devices.
Resumption
Faraday Cage/ Shield
Physical Tampering
Classification Scheme
47. A technology that reduces the size of a file.
Compression
Polyalphabetic
Security Domain
Entrapment
48. Requirement of access to data for a clearly defined purpose
Recovery
Honeypot
Need-To-Know
Fault Tolerance
49. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Repeaters
Data Dictionary
Privacy Laws
Multiplexers
50. A system designed to prevent unauthorized access to or from a private network.
Fraggle
Firewall
Legacy Data
Memory Management