SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To stop damage from spreading
Disaster Recovery Plan
Containment
Data Integrity
Accreditation
2. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
2-Phase Commit
Information Owner
Common Law
Masked/Interruptible
3. Written core statements that rarely change
Sequence Attacks
Electromagnetic Interference (EMI)
Policy
Architecture
4. Converts source code to an executable
Compiler
Copyright
Forensic Copy
Strategic
5. Information about data or records
Wait
Metadata
Electrostatic Discharge
Operational Test
6. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Data Dictionary
Multilevel Security System
Discretionary Access Control (DAC)
Incident
7. The collection and summation of risk data relating to a particular asset and controls for that asset
Cache
Risk Assessment
Directive
Maximum Tolerable Downtime (MTD)
8. Security policy - procedures - and compliance enforcement
Examples of non-technical security components
Tar Pits
Complete
Metadata
9. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Proxies
Modems
Eavesdropping
Denial Of Service
10. Data or interference that can trigger a false positive
File Level Deletion
Residual Risk
Electrostatic Discharge
Noise
11. An unintended communication path
Multi-Tasking
Covert Channel
Orange Book B1 Classification
Critical Infrastructure
12. Memory management technique that allows two processes to run concurrently without interaction
Deterrent
Protection
Time Of Check/Time Of Use
Faraday Cage/ Shield
13. Subjects will not interact with each other's objects
Sequence Attacks
Firmware
Non-Interference
Least Privilege
14. A unit of execution
Tort
Distributed Processing
Brouter
Threads
15. A backup of data located where staff can gain access immediately
Disaster Recovery Teams (Business Recovery Teams)
Event
War Dialing
On-Site
16. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Transfer
Fiber Optics
Incident Handling
File Sharing
17. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Polymorphism
System Downtime
Process Isolation
Declaration
18. Regular operations are stopped and where processing is moved to the alternate site.
Site Policy
Full-Interruption test
Information Flow Model
Cryptography
19. A group or network of honeypots
Proprietary
Honeynet
Trade Secret
Surge
20. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Redundant Servers
Corrective
2-Phase Commit
Monitor
21. Creation distribution update and deletion
Integrated Test
Key Management
Secondary Storage
Operational Test
22. A program with an inappropriate second purpose
Trojan Horse
Interception
Adware
Alternate Data Streams (File System Forks)
23. Object based description of a single resource and the permission each subject
Governance
Interception
Access Control Lists
Multi-Processing
24. Program that inappropriately collects private data or activity
Digital Signature
Packet Filtering
Spyware
Operational Impact Analysis
25. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Brouter
Incident Response
Source Routing Exploitation
Business Continuity Planning (BCP)
26. Eavesdropping on network communications by a third party.
Uninterruptible Power Supply (UPS)
Orange Book C2 Classification
Sniffing
Rollback
27. Total number of keys available that may be selected by the user of a cryptosystem
Data Marts
Key Space
ISO/IEC 27001
Recovery
28. Highest level of authority at EOC with knowledge of the business process and the resources available
Access Control Attacks
Rogue Access Points
Incident Manager
Alert
29. Eight bits.
Hot Spares
Byte
Wireless Fidelity (Wi-Fi )
Sampling
30. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Object
Call Tree
Centralized Access Control Technologies
Satellite
31. Actions measured against either a policy or what a reasonable person would do
Source Routing Exploitation
3 Types of harm Addressed in computer crime laws
Business Recovery Timeline
Due Diligence
32. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Business Interruption
Data Backup Strategies
Hard Disk
Covert Channel
33. Unchecked data which spills into another location in memory
Containment
Life Cycle of Evidence
Physical Tampering
Buffer Overflow
34. A disturbance that degrades performance of electronic devices and electronic communications.
Radio Frequency Interference (RFI)
Consistency
Incident Response Team
Mock Disaster
35. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Electronic Vaulting
Forward Recovery
Multilevel Security System
Log
36. A layer 3 device that used to connect two or more network segments and regulate traffic.
IP Fragmentation
System Life Cycle
Routers
Sag/Dip
37. Momentary loss of power
Fault
Checkpoint
File
Locard's Principle
38. Responsibility for actions
Liability
Mitigate
Data Hiding
Full Test (Full Interruption)
39. A database backup type which records at the transaction level
Remote Journaling
Central Processing Unit (CPU)
Structured Walk-Through Test
Brownout
40. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Payload
Durability
Integrated Test
MOM
41. Those who initiate the attack
Threat Agent
Plain Text
Tar Pits
Fiber Optics
42. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Disaster
Event
Crisis
Internal Use Only
43. To reduce sudden rises in current
Surge Suppressor
Adware
Object Reuse
Residual Risk
44. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Risk Assessment
Multilevel Security System
Surge
Business Records
45. Recovery alternative - everything needed for the business function - except people and last backup
Job Training
Hot Site
File Server
Shadowing (file shadowing)
46. Maintenance procedures outline the process for the review and update of business continuity plans.
Plan Maintenance Procedures
Event
Analysis
Restoration
47. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Embedded Systems
IP Address Spoofing
Procedure
Firmware
48. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Tort
Recovery Period
ITSEC
Framework
49. A protocol for the efficient transmission of voice over the Internet
Operational Exercise
Framework
Voice Over IP (VOIP)
Machine Language (Machine Code)
50. Unused storage capacity
Slack Space
Contingency Plan
Transients
Malformed Input