SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A control after attack
Countermeasure
Cross Training
Switches
Access Control Attacks
2. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
Checklist Test
Chain of Custody
User Mode (problem or program state)
3. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Multi-Programming
Job Training
Permutation /Transposition
4. The managerial approval to operate a system based upon knowledge of risk to operate
Worldwide Interoperability for Microwave Access (WI-MAX )
Access Control Lists
Accreditation
Job Rotation
5. One of the key benefits of a network is the ability to share files stored on the server among several users.
File Sharing
Copyright
Investigation
5 Rules Of Evidence
6. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Certificate Revocation List (CRL)
Highly Confidential
Fragmented Data
Durability
7. One entity with two competing allegiances
Conflict Of Interest
Alternate Site
Sag/Dip
Keyed-Hashing For Message Authentication
8. Maintenance procedures outline the process for the review and update of business continuity plans.
Tar Pits
ff Site
Hearsay
Plan Maintenance Procedures
9. A shield against leakage of electromagnetic signals.
Marking
Faraday Cage/ Shield
Kernel
Cookie
10. The core of a computer that calculates
Sag/Dip
Central Processing Unit (CPU)
Warm Site
Administrative
11. Natural occurrence in circuits that are in close proximity
Alternate Site
Hearsay Evidence
Interference (Noise)
Operational Exercise
12. Hiding the fact that communication has occurred
Steganography
Durability
TIFF (Tagged Image File Format)
Emanations
13. Recording the Who What When Where How of evidence
Electrostatic Discharge
Cold Site
Authorization
Chain Of Custody
14. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Concentrator
Reciprocal Agreement
Incident Response Team
CPU Cache
15. Potential danger to information or systems
TCSEC (Orange Book)
Threats
Compression
Hot Spares
16. Recovery alternative which includes cold site and some equipment and infrastructure is available
Warm Site
The ACID Test
Logic Bomb
Integrated Test
17. The chance that something negative will occur
Mixed Law System
Risk
Vital Record
Collisions
18. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Simulation Test
Sequence Attacks
Picking
Alert
19. To smooth out reductions or increases in power
Message Digest
UPS
Alarm Filtering
TNI (Red Book)
20. The hard drive
Exercise
Policy
Chain of Custody
Secondary Storage
21. The connection between a wireless and wired network.
Incident
Access Point
Quantitative
Interference (Noise)
22. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Brownout
True Attack Stimulus
Operational
Directive
23. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
Standard
SQL Injection
Vulnerability
Interpreter
24. A description of a database
Cross Certification
Computer Forensics
Encipher
Data Dictionary
25. A state for operating system tasks only
Orange Book C Classification
MOM
Supervisor Mode (monitor - system - privileged)
Kerckhoff's Principle
26. Converts source code to an executable
Bollard
Deadlock
Switches
Compiler
27. Maximum tolerance for loss of certain business function - basis of strategy
Database Shadowing
True Attack Stimulus
Emergency
Recovery Time Objectives
28. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
System Life Cycle
Due Diligence
Civil Or Code Law
29. A database backup type which records at the transaction level
Business Records
Database Replication
Remote Journaling
State Machine Model
30. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Business Continuity Planning (BCP)
Trademark
Operational
Orange Book C Classification
31. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Recovery Period
Inheritance
Side Channel Attack
Mission-Critical Application
32. Unauthorized wireless network access device.
Rogue Access Points
Repeaters
Data Marts
Time Of Check/Time Of Use
33. Business and technical process of applying security software updates in a regulated periodic way
Procedure
Investigation
Kerckhoff's Principle
Patch Management
34. System directed mediation of access with labels
Hijacking
Database Replication
Instance
Mandatory
35. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Risk Assessment / Analysis
Threads
Remote Journaling
Critical Functions
36. The partial or full duplication of data from a source database to one or more destination databases.
Ethics
Reciprocal Agreement
Residual Risk
Database Replication
37. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Memory Management
Trojan Horse
Disaster Recovery Tape
Archival Data
38. A passive network attack involving monitoring of traffic.
Contingency Plan
Authentic
Eavesdropping
Data Diddler
39. Weakness or flaw in an asset
Initialization Vector
Shadowing (file shadowing)
Vulnerability
Concentrator
40. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Relocation
Investigation
Information Risk Management (IRM)
Private Branch Exchange (PBX)
41. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
ISO/IEC 27001
Multi-Processing
Certificate Revocation List (CRL)
Data Integrity
42. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Access Control Matrix
Cryptovariable
Key Space
Business Interruption
43. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Reference Monitor
Worldwide Interoperability for Microwave Access (WI-MAX )
Stopped
Machine Language (Machine Code)
44. A software design technique for abstraction of a process
Database Shadowing
Information Risk Management (IRM)
Analysis
Data Hiding
45. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
TCSEC (Orange Book)
Discretionary Access Control (DAC)
Education
Class
46. To break a business process into separate functions and assign to different people
IP Fragmentation
Separation Of Duties
Denial Of Service
Cryptology
47. A backup type which creates a complete copy
System Life Cycle
Steganography
Replication
Vulnerability
48. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Mobile Site
Orange Book A Classification
Stopped
Data Leakage
49. A physical enclosure for verifying identity before entry to a facility
Non-Interference
Executive Succession
Guidelines
Mantrap (Double Door System)
50. Small data warehouse
Compartmentalize
Data Marts
Computer System Evidence
Business Unit Recovery