SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unsolicited commercial email
Object Oriented Programming (OOP)
Reference Monitor
Spam
Non-Repudiation
2. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Uninterruptible Power Supply (UPS)
MOM
Framework
Pervasive Computing and Mobile Computing Devices
3. Subset of operating systems components dedicated to protection mechanisms
Compensating
Business Continuity Program
Rootkit
Security Kernel
4. A condition in which neither party is willing to stop their activity for the other to complete
Civil Or Code Law
Asymmetric
Fault
Deadlock
5. Intellectual property protection for marketing efforts
Cold Site
Trademark
Encipher
Mock Disaster
6. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Mobile Site
Critical Infrastructure
Firewall
Site Policy Awareness
7. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Acronym for American Standard Code for Information Interchange (ASCII)
Administrative
Multilevel Security System
Business Records
8. High frequency noise
Electromagnetic Interference (EMI)
Interception
Masked/Interruptible
Confidence Value
9. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Encryption
Civil Or Code Law
Dangling Pointer
Data Backup Strategies
10. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Infrastructure
Business Interruption
Quantitative Risk Analysis
Confidence Value
11. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Threads
Certification Authority
Highly Confidential
Digital Signature
12. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification
Safeguard
Injection
Embedded Systems
13. Responsibility for actions
Data Integrity
3 Types of harm Addressed in computer crime laws
Checksum
Liability
14. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
The ACID Test
Blind Testing
Spiral
Faraday Cage/ Shield
15. Disruption of operation of an electronic device due to a competing electromagnetic field.
Running
Encapsulation
EMI
File Server
16. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
TIFF (Tagged Image File Format)
Structured Walk-Through Test
Payload
Standalone Test
17. An unintended communication path
Non-Interference
Covert Channel
Disaster Recovery Tape
Digital Certificate
18. Unchecked data which spills into another location in memory
Spiral
Buffer Overflow
Emanations
Phishing
19. A type a computer memory that temporarily stores frequently used information for quick access.
Voice Over IP (VOIP)
Cache
Copyright
Object
20. With enough computing power trying all possible combinations
Trojan Horse
Electronic Vaulting
Brute Force
Administrative Laws
21. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Warm Site
Repeaters
Alert
Tapping
22. Evidence must be: admissible - authentic - complete - accurate - and convincing
Public Key Infrastructure (PKI)
Total Risk
5 Rules Of Evidence
Business Recovery Team
23. Using many alphabets
Buffer Overflow
Critical Infrastructure
Spyware
Polyalphabetic
24. Code breaking - practice of defeating the protective properties of cryptography.
Cryptanalysis
Application Programming Interface
Primary Storage
Orange Book C Classification
25. Subject based description of a system or a collection of resources
Capability Tables
Critical Functions
Cipher Text
Orange Book D Classification
26. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Mirroring
System Life Cycle
Recovery
Notification
27. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Fire Prevention
3 Types of harm Addressed in computer crime laws
Memory Management
Data Backups
28. Act of luring an intruder and is legal.
Enticement
3 Types of harm Addressed in computer crime laws
Threats
Operational Exercise
29. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Kerckhoff's Principle
Recovery Point Objective (RPO)
Instance
Collisions
30. Requirement of access to data for a clearly defined purpose
Shielding
Need-To-Know
Standard
Atomicity
31. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Running Key
Total Risk
Fiber Optics
Pervasive Computing and Mobile Computing Devices
32. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Lattice
Distributed Denial Of Service
ITSEC
Mandatory Access Control (MAC)
33. A risk assessment method - measurable real money cost
Quantitative
Application Programming Interface
Crisis
Double Blind Testing
34. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Routers
Ring Protection
Criminal Law
Operational Test
35. Control category- to give instructions or inform
Top Secret
Computer Forensics
Directive
Multi-Tasking
36. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Shielding
Ethics
Packet Filtering
Enticement
37. Scrambled form of the message or data
Noise
Cipher Text
Elements of Negligence
Key Escrow
38. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Structured Walk-Through Test
Emergency Procedures
Warm Site
Inference
39. Abstract and mathematical in nature - defining all possible states - transitions and operations
Preemptive
Durability
State Machine Model
Analysis
40. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Central Processing Unit (CPU)
Pointer
Evidence
Firmware
41. Forgery of the sender's email address in an email header.
Disk Mirroring
Business Continuity Program
E-Mail Spoofing
Confidence Value
42. Encryption system using shared key/private key/single key/secret key
Hot Spares
Symmetric
Polymorphism
Full Test (Full Interruption)
43. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Copyright
Coaxial Cable
Virus
TNI (Red Book)
44. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Redundant Servers
Encryption
Least Privilege
Sampling
45. A type of multitasking that allows for more even distribution of computing time among competing request
Incident
Preemptive
Multi-Core
Off-Site Storage
46. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
SQL Injection
Salami
Life Cycle of Evidence
Key Space
47. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Job Rotation
Orange Book A Classification
Bit
Residual Risk
48. Less granular organization of controls -
Covert Channel
Record Level Deletion
Domain
Control Type
49. Unauthorized access of network devices.
System Life Cycle
Physical Tampering
Threats
Mock Disaster
50. Quantity of risk remaining after a control is applied
Certification Authority
Residual Risk
Coaxial Cable
Common Criteria