SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Authorization
Redundant Array Of Independent Drives (RAID)
Operational Exercise
Life Cycle of Evidence
2. A planned or unplanned interruption in system availability.
DR Or BC Coordinator
System Downtime
Private Branch Exchange (PBX)
Burn
3. Written step-by-step actions
File Server
Procedure
Shielding
Data Backup Strategies
4. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Metadata
Teardrop
Mandatory
Content Dependent Access Control
5. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. A backup type - for databases at a point in time
Microwave
Shadowing (file shadowing)
Risk Assessment
Initialization Vector
7. A running key using a random key that is never used again
One Time Pad
Policy
Interpreter
Data Warehouse
8. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Mirroring
Sharing
High-Risk Areas
Multilevel Security System
9. A covert storage channel on the file attribute
Alternate Data Streams (File System Forks)
Durability
Tort
Codec
10. Natural occurrence in circuits that are in close proximity
Trade Secret
Interception
Interference (Noise)
Incident Handling
11. Small data files written to a user's hard drive by a web server.
Rogue Access Points
Exercise
Cookie
Residual Risk
12. A one way - directed graph which indicates confidentiality or integrity flow
Trademark
Watermarking
Lattice
Sharing
13. Control category- to discourage an adversary from attempting to access
Degauss
Deterrent
Voice Over IP (VOIP)
Uninterruptible Power Supply (UPS)
14. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Public Key Infrastructure (PKI)
Non-Interference
Routers
Electronic Vaulting
15. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Checklist Test (desk check)
One Time Pad
Watermarking
Checklist Test
16. Someone who wants to cause harm
Isolation
Attacker (Black hat - Hacker)
Civil Or Code Law
Recovery Point Objective (RPO)
17. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Internal Use Only
Durability
File Server
Open Mail Relay Servers
18. A layer 2 device that used to connect two network segments and regulate traffic.
Detection
Bridge
Layering
Rootkit
19. Intellectual property protection for marketing efforts
Kernel
User Mode (problem or program state)
Trademark
Critical Infrastructure
20. Ertaining to a number system that has just two unique digits.
Embedded Systems
Brute Force
Failure Modes and Effect Analysis (FEMA)
Binary
21. The hard drive
Denial Of Service
Packet Filtering
Capability Tables
Secondary Storage
22. A copy of transaction data - designed for querying and reporting
Criminal Law
Administrative Laws
Data Warehouse
Brownout
23. Vehicle stopping object
Architecture
TIFF (Tagged Image File Format)
Boot (V.)
Bollard
24. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Rogue Access Points
Governance
Patent
Application Programming Interface
25. Just enough access to do the job
Liability
Least Privilege
Risk Assessment
Information Flow Model
26. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
ITSEC
Critical Infrastructure
False (False Positive)
Cross Certification
27. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Coaxial Cable
Surge Suppressor
Exercise
Security Clearance
28. To assert or claim credentialing to an authentication system
Locard's Principle
Salami
Birthday Attack
Identification
29. To execute more than one instruction at an instant in time
Liability
Fire Prevention
Multi-Processing
Remanence
30. A unit of execution
Kerberos
Payload
Threads
Brute Force
31. Act of luring an intruder and is legal.
Burn
Cross Certification
Fire Suppression
Enticement
32. Moving the alphabet intact a certain number spaces
False (False Positive)
Shift Cipher (Caesar)
Multi-Core
Radio Frequency Interference (RFI)
33. Pertaining to law - verified as real
Orange Book D Classification
Cryptography
Non-Repudiation
Authentic
34. An encryption method that has a key as long as the message
Faraday Cage/ Shield
System Downtime
Running Key
Content Dependent Access Control
35. Power surge
Assembler
Electrostatic Discharge
Fault
E-Mail Spoofing
36. Periodic - automatic and transparent backup of data in bulk.
Alarm Filtering
Data Dictionary
Locard's Principle
Electronic Vaulting
37. A trusted issuer of digital certificates
Standalone Test
Certification Authority
Polyalphabetic
CobiT
38. Malware that makes many small changes over time to a single data point or system
Critical Records
Eavesdropping
Salami
Remanence
39. The first rating that requires security labels
Change Control
Source Routing Exploitation
Orange Book B1 Classification
One Time Pad
40. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Contingency Plan
Control
Object Oriented Programming (OOP)
Business Continuity Steering Committee
41. A race condition where the security changes during the object's access
Site Policy Awareness
2-Phase Commit
Object Reuse
Time Of Check/Time Of Use
42. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Encryption
Convincing
TCSEC (Orange Book)
Hub
43. Creation distribution update and deletion
Embedded Systems
Hash Function
Key Management
Intrusion Prevention Systems
44. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Encryption
Access Point
3 Types of harm Addressed in computer crime laws
Twisted Pair
45. The chance that something negative will occur
Liability
Patch Management
Risk
Pointer
46. Quantity of risk remaining after a control is applied
Admissible
Eavesdropping
Spiral
Residual Risk
47. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
Business Impact Analysis
Centralized Access Control Technologies
Digital Certificate
48. Hardware or software that is part of a larger system
Supervisor Mode (monitor - system - privileged)
Directive
Embedded
Tar Pits
49. The core logic engine of an operating system which almost never changes
Kernel
Tactical
Access Control
Picking
50. A type a computer memory that temporarily stores frequently used information for quick access.
Cache
5 Rules Of Evidence
Chain of Custody
Data Recovery