SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Job Training
Waterfall
Worldwide Interoperability for Microwave Access (WI-MAX )
Orange Book A Classification
2. To start business continuity processes
Activation
E-Mail Spoofing
Fire Prevention
Damage Assessment
3. A design methodology which executes in a linear one way fashion
Chain Of Custody
Waterfall
Mobile Site
User Mode (problem or program state)
4. Written step-by-step actions
Procedure
Life Cycle of Evidence
Trusted Computing Base
Data Marts
5. High level - pertaining to planning
Wireless Fidelity (Wi-Fi )
Waterfall
Strategic
Switches
6. Effort/time needed to overcome a protective measure
Content Dependent Access Control
Access Control Lists
Work Factor
Separation Of Duties
7. A documented battle plan for coordinating response to incidents.
Incident Handling
Data Marts
Kerckhoff's Principle
Compensating
8. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Compression
Business Impact Assessment (BIA)
Phishing
Full Test (Full Interruption)
9. A system designed to prevent unauthorized access to or from a private network.
IP Fragmentation
Data Recovery
Due Care
Firewall
10. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Recovery Period
Byte Level Deletion
Mobile Recovery
Fire Suppression
11. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Alert
Incident Manager
Operational Impact Analysis
Key Space
12. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Spyware
False Attack Stimulus
Reference Monitor
Alert/Alarm
13. The technical and risk assesment of a system within the context of the operating environment
Distributed Denial Of Service
Certification
Containment
Risk
14. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Hijacking
Data Backup Strategies
Coaxial Cable
Residual Data
15. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. Hitting a filed down key in a lock with a hammer to open without real key
Byte Level Deletion
Administrative Laws
Encipher
Bumping
17. Memory management technique which allows subjects to use the same resource
Durability
Directive
Sharing
Active Data
18. Data or interference that can trigger a false positive
Conflict Of Interest
Protection
Noise
Recovery Period
19. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Multi-Programming
Botnet
Shadowing (file shadowing)
Fragmented Data
20. Uncleared buffers or media
Fire Prevention
Fire Detection
Fire Suppression
Object Reuse
21. To stop damage from spreading
Wireless Fidelity (Wi-Fi )
Containment
Hearsay Evidence
Layering
22. Written suggestions that direct choice to a few alternatives
Patch Management
Eavesdropping
Initialization Vector
Guidelines
23. A program with an inappropriate second purpose
Layering
Trojan Horse
Alternate Data Streams (File System Forks)
Computer Forensics
24. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Desk Check Test
Access Control Lists
Certification Authority
Data Recovery
25. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Alarm Filtering
Stopped
Electromagnetic Interference (EMI)
Simulation
26. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Symmetric
Generator
Overlapping Fragment Attack
Procedure
27. Memory - RAM
Fire Detection
Primary Storage
Access Control Attacks
JPEG (Joint Photographic Experts Group)
28. A back up type - where the organization has excess capacity in another location.
Distributed Processing
Checklist Test
Coaxial Cable
Disaster
29. Natural or human-readable form of message
Fire Prevention
Critical Records
Elements of Negligence
Plain Text
30. Ertaining to a number system that has just two unique digits.
JPEG (Joint Photographic Experts Group)
Binary
Parallel Test
Hacker
31. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Trade Secret
Boot (V.)
Critical Infrastructure
Investigation
32. Memory management technique which allows data to be moved from one memory address to another
Checklist Test (desk check)
Trademark
Worldwide Interoperability for Microwave Access (WI-MAX )
Relocation
33. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Access Point
Classification Scheme
Risk Mitigation
Mantrap (Double Door System)
34. Power surge
Intrusion Detection Systems
Architecture
Embedded
Electrostatic Discharge
35. One way encryption
Control Type
Disaster Recovery Tape
Hash Function
Transfer
36. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
User
Honeypot
Aggregation
Public Key Infrastructure (PKI)
37. Actions measured against either a policy or what a reasonable person would do
Due Diligence
Detective
Simulation
Warm Site
38. An event which stops business from continuing.
HTTP Response Splitting
Trusted Computing Base
Remanence
Disaster
39. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Smurf
Restoration
Checklist Test
Relocation
40. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Botnet
Distributed Denial Of Service
Transients
System Life Cycle
41. A risk assessment method - intrinsic value
Teardrop
Qualitative
Botnet
Fault
42. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
E-Mail Spoofing
Contingency Plan
Pervasive Computing and Mobile Computing Devices
Acronym for American Standard Code for Information Interchange (ASCII)
43. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Disaster Recovery Plan
Key Space
Recovery Period
Simulation Test
44. False memory reference
Threads
Mandatory
Dangling Pointer
Salami
45. Highest level of authority at EOC with knowledge of the business process and the resources available
Incident Manager
Simulation
Electromagnetic Interference (EMI)
Log
46. System directed mediation of access with labels
Mandatory
Double Blind Testing
Running
Standard
47. Property that data is represented in the same manner at all times
Consistency
Security Clearance
Bumping
Threads
48. Creation distribution update and deletion
Key Management
Pointer
Structured Walk-Through Test
Near Site
49. Recording the Who What When Where How of evidence
Restoration
Sequence Attacks
Chain Of Custody
Fragmented Data
50. Consume resources to a point of exhaustion - loss of availability
Open Mail Relay Servers
Supervisor Mode (monitor - system - privileged)
Denial Of Service
Remote Journaling