SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Weak evidence
Criminal Law
Hearsay
Malformed Input
Incident Response
2. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Recovery Point Objective (RPO)
Event
Complete
Bumping
3. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Quantitative Risk Analysis
Routers
Degauss
Alert
4. System of law based upon what is good for society
Civil Or Code Law
Tapping
Discretionary
Examples of non-technical security components
5. Using small special tools all tumblers of the lock are aligned - opening the door
Bridge
Object
Reference Monitor
Picking
6. A collection of information designed to reduce duplication and increase integrity
Investigation
Databases
Mandatory Access Control (MAC)
Deterrent
7. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Call Tree
Tar Pits
Process Isolation
Structured Walkthrough
8. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Access Control Lists
Multi-Tasking
Waterfall
Polymorphism
9. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Confidence Value
Deletion
TNI (Red Book)
Man-In-The-Middle Attack
10. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
True Attack Stimulus
Hard Disk
Infrastructure
System Downtime
11. Recovery alternative - short-term - high cost movable processing location
Side Channel Attack
Redundant Servers
Mobile Site
Object Reuse
12. Interception of a communication session by an attacker.
Guidelines
Lattice
Hijacking
Method
13. Lower frequency noise
Radio Frequency Interference (RFI)
Wait
Analysis
Logic Bomb
14. Act of luring an intruder and is legal.
Enticement
Double Blind Testing
Job Rotation
Sampling
15. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Key Space
Class
Revocation
Basics Of Secure Design
16. A layer 2 device that used to connect two network segments and regulate traffic.
E-Mail Spoofing
Bridge
Algorithm
Sag/Dip
17. Asymmetric encryption of a hash of message
Binary
Digital Signature
Storage Area Network (SAN)
Distributed Processing
18. Indivisible - data field must contain only one value that either all transactions take place or none do
Atomicity
Labeling
Malformed Input
Radio Frequency Interference (RFI)
19. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Entrapment
Remanence
Access Control Matrix
ITSEC
20. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Technical Access Controls
Business Recovery Timeline
Machine Language (Machine Code)
Buffer Overflow
21. Real-time - automatic and transparent backup of data.
Accountability
Policy
Site Policy
Remote Journaling
22. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Separation Of Duties
Administrative Law
Mission-Critical Application
Reciprocal Agreement
23. OOP concept of a template that consist of attributes and behaviors
Class
Reference Monitor
Failure Modes and Effect Analysis (FEMA)
Tracking
24. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
High-Risk Areas
Fraggle
Cryptanalysis
Job Training
25. Pertaining to law - high degree of veracity
Accurate
Infrastructure
Key Space
Access Control
26. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
Civil Law
TNI (Red Book)
Polyalphabetic
Disaster Recovery Plan
27. An alert or alarm that is triggered when no actual attack has taken place
False (False Positive)
TIFF (Tagged Image File Format)
Firmware
Orange Book B1 Classification
28. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Satellite
Slack Space
Smurf
Technical Access Controls
29. Key
Cryptovariable
Strong Authentication
Shielding
Business Impact Analysis
30. Some systems are actually run at the alternate site
Parallel Test
Business Continuity Planning (BCP)
Radio Frequency Interference (RFI)
Concentrator
31. Used to code/decode a digital data stream.
Codec
Electrostatic Discharge
Administrative Access Controls
Standalone Test
32. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Site Policy Awareness
Incident Handling
Hot Spares
Shielding
33. Written internalized or nationalized norms that are internal to an organization
Security Kernel
IP Address Spoofing
Standard
Double Blind Testing
34. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Surge Suppressor
Mandatory Access Control (MAC)
Mission-Critical Application
Data Diddler
35. An image compression standard for photographs
Notification
Critical Infrastructure
JPEG (Joint Photographic Experts Group)
Incident Handling
36. The partial or full duplication of data from a source database to one or more destination databases.
Database Replication
Accountability
Mock Disaster
Residual Data
37. The hard drive
Pointer
Plaintext
Atomicity
Secondary Storage
38. An event which stops business from continuing.
Electronic Vaulting
Disaster
Critical Infrastructure
Exposure
39. Record of system activity - which provides for monitoring and detection.
Off-Site Storage
Disaster
Multi-Party Control
Log
40. Requirement to take time off
Distributed Processing
Mandatory Vacations
Honeypot
Cache
41. With enough computing power trying all possible combinations
Data Recovery
Brute Force
Slack Space
Common Law
42. To segregate for the purposes of labeling
Governance
Symmetric
Distributed Processing
Compartmentalize
43. Short period of low voltage.
Fragmented Data
Sag/Dip
Business Continuity Program
Threats
44. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Declaration
Computer Forensics
Operational
Firewalls
45. Using many alphabets
Threats
Access Control Matrix
Metadata
Polyalphabetic
46. One of the key benefits of a network is the ability to share files stored on the server among several users.
File Sharing
Brute Force
Admissible
Slack Space
47. Act of scrambling the cleartext message by using a key.
Archival Data
Encipher
Side Channel Attack
Structured Walkthrough
48. A database backup type which records at the transaction level
Restoration
Isolation
Remote Journaling
Event
49. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Targeted Testing
Multi-Processor
Domain
Civil Law
50. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Authorization
Policy
Payload
Call Tree