SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To know more than one job
Aggregation
Proprietary
Cross Training
Fire Classes
2. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Ring Protection
Off-Site Storage
Encryption
Transients
3. Location to perform the business function
Alternate Site
Incident Response Team
Data Warehouse
Electromagnetic Interference (EMI)
4. Power surge
Data Recovery
Remote Journaling
Analysis
Electrostatic Discharge
5. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Repeaters
Business Interruption Insurance
Governance
Orange Book B2 Classification
6. Two different keys decrypt the same cipher text
Incident Handling
Residual Risk
Key Clustering
Initialization Vector
7. Memory management technique which allows subjects to use the same resource
Sharing
Risk Assessment / Analysis
Rogue Access Points
Deleted File
8. Wrong against society
Control Type
Proxies
Cross-Site Scripting
Criminal Law
9. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Object Oriented Programming (OOP)
Restoration
Near Site
Mantrap (Double Door System)
10. Responsibility of a user for the actions taken by their account which requires unique identification
Accountability
Emergency Procedures
Recovery
Virtual Memory
11. The core of a computer that calculates
File Level Deletion
Radio Frequency Interference (RFI)
Elements of Negligence
Central Processing Unit (CPU)
12. Recognition of an individual's assertion of identity.
Packet Filtering
Authentic
Database Replication
Identification
13. OOP concept of a template that consist of attributes and behaviors
Worm
Class
Brute Force
Plaintext
14. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Multi-Party Control
Multi-Core
SYN Flooding
Classification Scheme
15. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Rootkit
True Attack Stimulus
Hot Site
Simulation
16. Using small special tools all tumblers of the lock are aligned - opening the door
Repeaters
Radio Frequency Interference (RFI)
Information Risk Management (IRM)
Picking
17. More than one CPU on a single board
Orange Book D Classification
Simulation
Multi-Core
Near Site
18. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Distributed Processing
Reference Monitor
Initialization Vector
Mock Disaster
19. A test conducted on one or more components of a plan under actual operating conditions.
Accreditation
Encryption
Operational Test
Collisions
20. Transaction controls for a database - a return to a previous state
Copyright
Due Diligence
Rollback
Database Shadowing
21. Communicate to stakeholders
Distributed Processing
Algorithm
Debriefing/Feedback
Notification
22. Employment education done once per position or at significant change of function
Job Training
Isolation
Procedure
Data Warehouse
23. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
EMI
Electrostatic Discharge
Malformed Input
Plaintext
24. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Concentrator
Triage
Birthday Attack
Simulation
25. Eight bits.
Accreditation
Cookie
Site Policy
Byte
26. Consume resources to a point of exhaustion - loss of availability
Fragmented Data
Denial Of Service
System Downtime
Inference
27. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Access Control Matrix
Application Programming Interface
Recovery Strategy
Business Continuity Program
28. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Copyright
Redundant Array Of Independent Drives (RAID)
Framework
ISO/IEC 27001
29. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
File Shadowing
Workaround Procedures
Standard
Residual Risk
30. Calculation encompassing threats - vulnerabilities and assets
Due Care
Access Control Lists
Total Risk
Legacy Data
31. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Infrastructure
Disaster
Mandatory Access Control (MAC)
Embedded Systems
32. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Incident Response Team
Threads
Territoriality
Mock Disaster
33. A software design technique for abstraction of a process
Birthday Attack
Data Hiding
Operational Exercise
Orange Book A Classification
34. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Journaling
3 Types of harm Addressed in computer crime laws
Sampling
Accountability
35. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Preemptive
War Driving
Administrative Access Controls
Bit
36. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Data Leakage
Sag/Dip
Resumption
Digital Signature
37. A record that must be preserved and available for retrieval if needed.
Vital Record
Strategic
Checklist Test
Symmetric
38. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Initialization Vector
Uninterruptible Power Supply (UPS)
On-Site
Remote Access Trojan
39. Memory management technique that allows two processes to run concurrently without interaction
Data Marts
Checksum
CPU Cache
Protection
40. Unsolicited commercial email
Moore's Law
Spam
Logic Bomb
Masquerading
41. A Trojan horse with the express underlying purpose of controlling host from a distance
Boot (V.)
Remote Access Trojan
Switches
Classification Scheme
42. Try a list of words in passwords or encryption keys
Dictionary Attack
Cryptology
Policy
Embedded Systems
43. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Kerberos
Revocation
Key Escrow
Method
44. Is secondhand and usually not admissible in court
ISO/IEC 27001
Class
Hearsay Evidence
Journaling
45. Lower frequency noise
Analysis
TCSEC (Orange Book)
Off-Site Storage
Radio Frequency Interference (RFI)
46. Individuals and departments responsible for the storage and safeguarding of computerized data.
Aggregation
Data Custodian
Open Mail Relay Servers
Failure Modes and Effect Analysis (FEMA)
47. One way encryption
Information Risk Management (IRM)
Recovery Point Objective (RPO)
Operational
Hash Function
48. A form of data hiding which protects running threads of execution from using each other's memory
Process Isolation
Proprietary
Threats
Resumption
49. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
False Attack Stimulus
Information Risk Management (IRM)
Blackout
Compensating
50. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Concatenation
Interpreter
Data Diddler
Reference Monitor