SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to code/decode a digital data stream.
Strong Authentication
Hard Disk
Codec
SQL Injection
2. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Checkpoint
Workaround Procedures
Remote Access Trojan
Virus
3. Pertaining to law - accepted by a court
Dictionary Attack
Admissible
Qualitative
Cookie
4. Claiming another's identity at a physical level
Masquerading
Multi-Tasking
Sag/Dip
Near Site
5. The study of cryptography and cryptanalysis
Cryptology
Spam
Journaling
Mission-Critical Application
6. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Administrative Laws
Reference Monitor
HTTP Response Splitting
Private Branch Exchange (PBX)
7. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Legacy Data
Shift Cipher (Caesar)
Safeguard
Technical Access Controls
8. OOP concept of a distinct copy of the class
Surge
Business Impact Assessment (BIA)
Object
Computer Forensics
9. A test conducted on one or more components of a plan under actual operating conditions.
Generator
Disaster
Operational Test
Electronic Vaulting
10. Control category- to give instructions or inform
Directive
Switches
Phishing
Recovery
11. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Tracking
Concentrator
Quantitative
Embedded Systems
12. A unit of execution
Threads
Data Backups
Entrapment
Repeaters
13. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Distributed Denial Of Service
Network Attached Storage (NAS)
Secondary Storage
Data Backup Strategies
14. Something that happened
ISO/IEC 27002
Polyalphabetic
Event
Polymorphism
15. To know more than one job
Administrative Law
Degauss
Cross Training
Coaxial Cable
16. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Technical Access Controls
Capability Tables
Secondary Storage
Journaling
17. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Metadata
Electronic Vaulting
Due Diligence
Incident Response Team
18. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Pervasive Computing and Mobile Computing Devices
True Attack Stimulus
Key Escrow
Orange Book C Classification
19. Evidence must be: admissible - authentic - complete - accurate - and convincing
Compartmentalize
File Server
5 Rules Of Evidence
Service Bureau
20. Total number of keys available that may be selected by the user of a cryptosystem
Phishing
Key Space
Proprietary
Interpreter
21. Code breaking - practice of defeating the protective properties of cryptography.
File Shadowing
Instance
Deleted File
Cryptanalysis
22. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Deterrent
Log
Disaster Recovery Plan
Information Risk Management (IRM)
23. Forgery of the sender's email address in an email header.
Shadowing (file shadowing)
Framework
E-Mail Spoofing
Checklist Test
24. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Switches
Hacker
Sniffing
25. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Orange Book A Classification
Tort
Kernel
Digital Signature
26. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Prevention
Emergency Procedures
Data Leakage
Side Channel Attack
27. A system designed to prevent unauthorized access to or from a private network.
Internal Use Only
Object Oriented Programming (OOP)
Firewall
Analysis
28. Reprogrammable basic startup instructions
Firmware
Exposure
Certification
Operational
29. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Authentication
Contact List
Structured Walkthrough
Access Control Matrix
30. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Legacy Data
5 Rules Of Evidence
Data Recovery
Remote Journaling
31. Disruption of operation of an electronic device due to a competing electromagnetic field.
Information Owner
EMI
Isolation
Entrapment
32. Using many alphabets
Event
Brouter
Polyalphabetic
Attacker (Black hat - Hacker)
33. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Authorization
Digital Signature
Recovery Strategy
Eavesdropping
34. Recovery alternative - short-term - high cost movable processing location
Hearsay Evidence
Non-Repudiation
Mobile Site
Hot Site
35. Pertaining to law - verified as real
Preemptive
Information Owner
Authentic
Private Branch Exchange (PBX)
36. Information about a particular data set
Metadata
Intrusion Prevention Systems
Covert Channel
Business Unit Recovery
37. Communicate to stakeholders
Debriefing/Feedback
Bridge
Procedure
Business Impact Analysis
38. Interception of a communication session by an attacker.
Fire Prevention
Hijacking
Fraggle
Checkpoint
39. Independent malware that requires user interaction to execute
Virus
Sharing
State Machine Model
Source Routing Exploitation
40. Small data warehouse
Forensic Copy
Data Marts
File Extension
Encapsulation
41. An availability attack - to consume resources to the point of exhaustion
Mandatory Access Control (MAC)
Deterrent
Denial Of Service
Prevention
42. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Inheritance
Orange Book B2 Classification
Code
Alternate Data Streams (File System Forks)
43. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
Hearsay Evidence
Confidence Value
Primary Storage
SQL Injection
44. OOP concept of a taking attributes from the original or parent
Multi-Processor
Inheritance
Identification
Preemptive
45. Weak evidence
Bit
Database Shadowing
Hearsay
ISO/IEC 27002
46. Controls deployed to avert unauthorized and/or undesired actions.
Prevention
User
Virus
Deletion
47. Recovery alternative - everything needed for the business function - except people and last backup
Record Level Deletion
Side Channel Attack
Hot Site
Rogue Access Points
48. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Acronym for American Standard Code for Information Interchange (ASCII)
Supervisor Mode (monitor - system - privileged)
Business Recovery Timeline
Checklist Test (desk check)
49. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Control Type
TNI (Red Book)
Business Continuity Program
Certification Authority
50. A back up type - where the organization has excess capacity in another location.
Ethics
Content Dependent Access Control
Distributed Processing
Incident Manager