SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Narrow scope examination of a system
Process Isolation
Hub
Targeted Testing
Due Diligence
2. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Data Owner
Mirrored Site
Firewalls
Recovery Point Objective (RPO)
3. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
Symmetric
Tort
MOM
Layering
4. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Modification
Business Records
Centralized Access Control Technologies
Twisted Pair
5. A mathematical tool for verifying no unintentional changes have been made
Critical Records
Kernel
Mirroring
Checksum
6. The partial or full duplication of data from a source database to one or more destination databases.
Database Replication
Fault Tolerance
Radio Frequency Interference (RFI)
Sharing
7. Reduces causes of fire
Mission-Critical Application
Fire Prevention
Forward Recovery
Virtual Memory
8. One of the key benefits of a network is the ability to share files stored on the server among several users.
Data Marts
Critical Functions
Isolation
File Sharing
9. Power surge
Inrush Current
Electrostatic Discharge
Spam
File Shadowing
10. To break a business process into separate functions and assign to different people
Incident
Dangling Pointer
Separation Of Duties
Access Control Attacks
11. One way encryption
Hash Function
Burn
Distributed Denial Of Service
Database Replication
12. System directed mediation of access with labels
Sniffing
Teardrop
Internal Use Only
Mandatory
13. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Electrostatic Discharge
Hearsay
Masked/Interruptible
Business Continuity Steering Committee
14. Act of luring an intruder and is legal.
Enticement
Crisis
Data Backup Strategies
Surge Suppressor
15. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Exposure
Shielding
Mobile Recovery
Public Key Infrastructure (PKI)
16. A electronic attestation of identity by a certificate authority
Access Control
Mock Disaster
Digital Certificate
Strong Authentication
17. To start business continuity processes
Intrusion Detection Systems
Mobile Site
Activation
Total Risk
18. Consume resources to a point of exhaustion - loss of availability
Process Isolation
Safeguard
Operational Test
Denial Of Service
19. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Analysis
Application Programming Interface
BCP Testing Drills and Exercises
Firewall
20. A form of data hiding which protects running threads of execution from using each other's memory
Confidence Value
Process Isolation
Certification Authority
Exposure
21. Two certificate authorities that trust each other
Aggregation
Cross Certification
Plain Text
Residual Data
22. Mediation of covert channels must be addressed
Information Flow Model
Picking
Common Law
Least Privilege
23. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Orange Book D Classification
Risk Mitigation
System Downtime
Denial Of Service
24. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Proprietary
Codec
Business Interruption Insurance
Technical Access Controls
25. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Business Continuity Program
Operational Impact Analysis
Waterfall
Trade Secret
26. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Running
Data Backups
Accreditation
Job Rotation
27. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Orange Book B2 Classification
Least Privilege
Contingency Plan
Data Diddler
28. Requirement of access to data for a clearly defined purpose
Deadlock
Need-To-Know
Civil Or Code Law
Forensic Copy
29. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
ISO/IEC 27002
Call Tree
Data Owner
Masquerading
30. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Mixed Law System
Integrated Test
Voice Over IP (VOIP)
Standard
32. Momentary loss of power
Substitution
Fault
Identification
Access Control Matrix
33. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Firewalls
Internal Use Only
Strong Authentication
Change Control
34. Written suggestions that direct choice to a few alternatives
Wait
Guidelines
Business Continuity Planning (BCP)
Method
35. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Kerberos
Teardrop
Multi-Processor
Asymmetric
36. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Vulnerability
Boot (V.)
Analysis
Business Recovery Team
37. A covert storage channel on the file attribute
Operational Exercise
Trusted Computing Base
Alternate Data Streams (File System Forks)
Object Oriented Programming (OOP)
38. Maximum tolerance for loss of certain business function - basis of strategy
MOM
Certification
Corrective
Recovery Time Objectives
39. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Remote Journaling
Event
Worldwide Interoperability for Microwave Access (WI-MAX )
Tort
40. Physical description on the exterior of an object that communicates the existence of a label
Common Law
Detection
Marking
Cookie
41. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Elements of Negligence
Site Policy
Workaround Procedures
Bit
42. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Disaster Recovery Teams (Business Recovery Teams)
Fragmented Data
Data Diddler
Alert/Alarm
43. The level and label given to an individual for the purpose of compartmentalization
Security Clearance
Cipher Text
Tar Pits
Simulation Test
44. System mediation of access with the focus on the context of the request
Content Dependent Access Control
Stopped
Running Key
Radio Frequency Interference (RFI)
45. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Administrative Law
Top Secret
Running Key
Alert/Alarm
46. Substitution at the word or phrase level
Code
Data Owner
Classification
Administrative Access Controls
47. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Access Control Attacks
Legacy Data
Surge Suppressor
Risk Mitigation
48. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Fire Classes
Byte Level Deletion
Picking
Notification
49. OOP concept of a distinct copy of the class
Administrative Law
Basics Of Secure Design
Object
Mobile Site
50. Impossibility of denying authenticity and identity
Cold Site
Denial Of Service
Non-Repudiation
Business Interruption