SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Short period of low voltage.
Simulation
Quantitative
Sag/Dip
Total Risk
2. The first rating that requires security labels
Mirrored Site
Denial Of Service
Convincing
Orange Book B1 Classification
3. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Examples of technical security components
Critical Infrastructure
Workaround Procedures
Binary
4. An encryption method that has a key as long as the message
Denial Of Service
Security Domain
Running Key
Orange Book B2 Classification
5. Mediation of covert channels must be addressed
Information Flow Model
Residual Risk
Threats
Redundant Array Of Independent Drives (RAID)
6. All of the protection mechanism in a computer system
Redundant Array Of Independent Drives (RAID)
Switches
Trusted Computing Base
Storage Area Network (SAN)
7. Intellectual property protection for the expression of an idea
Multilevel Security System
Copyright
Routers
Near Site
8. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Object Oriented Programming (OOP)
Concentrator
Debriefing/Feedback
Rollback
9. Try a list of words in passwords or encryption keys
Compiler
Residual Data
Hijacking
Dictionary Attack
10. An unintended communication path
Tapping
Electromagnetic Interference (EMI)
Separation Of Duties
Covert Channel
11. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Corrective
Dictionary Attack
Interception
Durability
12. Mathematical function that determines the cryptographic operations
Mandatory
Primary Storage
Algorithm
Hearsay Evidence
13. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Common Law
Risk Assessment
ff Site
Central Processing Unit (CPU)
14. Control category - more than one control on a single asset
Containment
Compensating
CobiT
Business Impact Assessment (BIA)
15. A temporary public file to inform others of a compromised digital certificate
Certificate Revocation List (CRL)
Keystroke Logging
Simulation
Information Risk Management (IRM)
16. Induces a crime - tricks a person - and is illegal
Entrapment
Simulation
Business Unit Recovery
JPEG (Joint Photographic Experts Group)
17. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
False Attack Stimulus
Standard
Discretionary
Recovery Point Objective (RPO)
18. A collection of data or information that has a name
Spiral
Security Blueprint
On-Site
File
19. The level and label given to an individual for the purpose of compartmentalization
Marking
Business Recovery Team
Security Clearance
Threats
20. For PKI - decertify an entities certificate
Faraday Cage/ Shield
Revocation
Recovery Time Objectives
Interpreter
21. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Checklist Test
Rootkit
Steganography
Data Recovery
22. An individuals conduct that violates government laws developed to protect the public
Simulation Test
Criminal Law
Alternate Data Streams (File System Forks)
Uninterruptible Power Supply (UPS)
23. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Governance
Shift Cipher (Caesar)
Active Data
Multi-Programming
24. A template for the designing the architecture
Fiber Optics
Trojan Horse
Data Hiding
Security Blueprint
25. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Non-Discretionary Access Control
Confidence Value
Honeynet
Multi-Processing
26. Recovery alternative - a building only with sufficient power - and HVAC
Cold Site
SYN Flooding
Salami
Disaster
27. Record history of incident
Tracking
Trojan Horse
Confidence Value
TCSEC (Orange Book)
28. Sudden rise in voltage in the power supply.
Surge
Source Routing Exploitation
Relocation
Memory Management
29. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Off-Site Storage
Rootkit
Administrative Laws
Proxies
30. A failure of an IDS to detect an actual attack
JPEG (Joint Photographic Experts Group)
Slack Space
Security Blueprint
False Negative
31. Long term knowledge building
Information Risk Management (IRM)
Education
Digital Signature
Record Level Deletion
32. A control after attack
Countermeasure
Blind Testing
Digital Certificate
Secondary Storage
33. Those who initiate the attack
Walk Though
Access Control Lists
Threat Agent
Top Secret
34. High level design or model with a goal of consistency - integrity - and balance
Tort
Metadata
Distributed Processing
Architecture
35. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Compensating
Mission-Critical Application
File Extension
Distributed Denial Of Service
36. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Cross Certification
Governance
Executive Succession
Emanations
37. Line by line translation from a high level language to machine code
Payload
Stopped
Interpreter
Accurate
38. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Asymmetric
Ethics
Critical Functions
War Dialing
39. Guidelines within an organization that control the rules and configurations of an IDS
Cross Certification
Detection
ff Site
Site Policy
40. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Criminal Law
Legacy Data
Orange Book C Classification
Sag/Dip
41. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Architecture
Tar Pits
Policy
Corrective
42. A backup type which creates a complete copy
Fault
Malformed Input
Replication
Object Reuse
43. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Supervisor Mode (monitor - system - privileged)
Reciprocal Agreement
Data Warehouse
Critical Functions
44. Potentially retrievable data residue that remains following intended erasure of data.
Service Bureau
Remanence
Basics Of Secure Design
Modification
45. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Codec
Brouter
Structured Walk-Through Test
Threats
46. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Disaster Recovery Teams (Business Recovery Teams)
Non-Repudiation
Journaling
IDS Intrusion Detection System
47. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Injection
Containment
Voice Over IP (VOIP)
Criminal Law
48. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
File Level Deletion
Spyware
Data Backups
Access Control Lists
49. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Slack Space
Copyright
Fire Classes
Corrective
50. Communicate to stakeholders
Debriefing/Feedback
Disaster Recovery Plan
Embedded
Entrapment