SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
EMI
Operational Impact Analysis
Disk Mirroring
Criminal Law
2. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Sampling
Access Control Lists
Disaster Recovery Tape
War Dialing
3. A electronic attestation of identity by a certificate authority
State Machine Model
BCP Testing Drills and Exercises
Digital Certificate
Examples of technical security components
4. OOP concept of a class's details to be hidden from object
Microwave
Monitor
Encapsulation
War Driving
5. Methodical research of an incident with the purpose of finding the root cause
Authentication
Data Diddler
Investigation
Deterrent
6. Memory management technique which allows data to be moved from one memory address to another
Relocation
Hot Site
Multi-Processing
Detective
7. The hard drive
Embedded Systems
Secondary Storage
Incident Response Team
TCSEC (Orange Book)
8. Searching for wireless networks in a moving car.
War Driving
File Level Deletion
Tapping
Fraggle
9. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
IP Address Spoofing
Remanence
Checklist Test
Exercise
10. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Operational
Network Attached Storage (NAS)
Simulation Test
Modification
11. To reduce fire
Spiral
Patch Panels
Fire Suppression
Highly Confidential
12. Intellectual property management technique for identifying after distribution
Plan Maintenance Procedures
System Life Cycle
Watermarking
Business Interruption Insurance
13. Unauthorized access of network devices.
Site Policy Awareness
Data Warehouse
Physical Tampering
Need-To-Know
14. A layer 2 device that used to connect two or more network segments and regulate traffic.
Territoriality
Control Category
System Life Cycle
Switches
15. High level design or model with a goal of consistency - integrity - and balance
Access Control Attacks
Architecture
Shift Cipher (Caesar)
ISO/IEC 27001
16. Subset of operating systems components dedicated to protection mechanisms
Near Site
Security Kernel
Bumping
Data Leakage
17. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Critical Functions
Orange Book A Classification
Forensic Copy
Hot Spares
18. Record history of incident
Tracking
Remote Access Trojan
File Level Deletion
Business Unit Recovery
19. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Cryptanalysis
Job Rotation
IP Fragmentation
Algorithm
20. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Incident Response Team
Residual Data
Byte
Legacy Data
21. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
TCSEC (Orange Book)
Moore's Law
Object Oriented Programming (OOP)
Copyright
22. Communicate to stakeholders
Kerckhoff's Principle
Reciprocal Agreement
Debriefing/Feedback
Encipher
23. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
On-Site
Alarm Filtering
Residual Data
Cryptovariable
24. A layer 3 device that used to connect two or more network segments and regulate traffic.
Routers
ff Site
User
Codec
25. Potential danger to information or systems
Encryption
Threats
Ethics
Algorithm
26. Try a list of words in passwords or encryption keys
Algorithm
Enticement
Dictionary Attack
Polyalphabetic
27. A programming design concept which abstracts one set of functions from another in a serialized fashion
Threats
Layering
Quantitative Risk Analysis
Hearsay Evidence
28. A copy of transaction data - designed for querying and reporting
Mobile Site
Noise
Radio Frequency Interference (RFI)
Data Warehouse
29. A description of a database
Sampling
Data Dictionary
Atomicity
Accreditation
30. A type a computer memory that temporarily stores frequently used information for quick access.
Cache
Civil Law
Electrostatic Discharge
Database Shadowing
31. A type of attack involving attempted insertion - deletion or altering of data.
3 Types of harm Addressed in computer crime laws
Hot Spares
Mandatory Access Control (MAC)
Modification
32. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Kernel
Chain of Custody
Keyed-Hashing For Message Authentication
BCP Testing Drills and Exercises
33. A device that sequentially switches multiple analog inputs to the output.
Multiplexers
Asymmetric
Structured Walk-Through Test
Sag/Dip
34. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Business Continuity Planning (BCP)
Risk
System Life Cycle
Critical Records
35. Firewalls - encryption - and access control lists
Critical Functions
Risk Mitigation
Electromagnetic Interference (EMI)
Examples of technical security components
36. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Off-Site Storage
Recovery Period
Administrative Law
Business Recovery Timeline
37. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Smurf
Mandatory Vacations
Redundant Servers
Polymorphism
38. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Structured Walkthrough
ISO/IEC 27001
Resumption
Residual Data
39. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Fire Classes
Quantitative Risk Analysis
Privacy Laws
Tar Pits
40. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Contact List
Contingency Plan
Analysis
Custodian
41. Control type- that is communication based - typically written or oral
Central Processing Unit (CPU)
Phishing
Administrative
Proprietary
42. A device that converts between digital and analog representation of data.
Surge Suppressor
Modems
Generator
Civil Or Code Law
43. Potentially retrievable data residue that remains following intended erasure of data.
File Server
Remanence
Administrative
Electronic Vaulting
44. Unsolicited commercial email
Job Rotation
Spam
Admissible
Fragmented Data
45. Converts source code to an executable
Information Flow Model
Key Escrow
Compiler
Alternate Site
46. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Checkpoint
Time Of Check/Time Of Use
True Attack Stimulus
Contingency Plan
47. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Mock Disaster
Hub
War Driving
HTTP Response Splitting
48. Measures followed to restore critical functions following a security incident.
Burn
Education
Recovery
Bit
49. A state where two subjects can access the same object without proper mediation
Common Law
Business Unit Recovery
Race Condition
Fault
50. The study of cryptography and cryptanalysis
Cryptology
Checkpoint
Algorithm
Notification