SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Key
Sharing
Security Domain
Education
Cryptovariable
2. Intellectual property protection for an confidential and critical process
Twisted Pair
Trade Secret
Containment
Operational Exercise
3. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
Durability
Shadowing (file shadowing)
Alarm Filtering
MOM
4. Methodical research of an incident with the purpose of finding the root cause
Algorithm
Object Oriented Programming (OOP)
Data Dictionary
Investigation
5. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Risk Assessment
Multi-Processing
Active Data
Bumping
6. A risk assessment method - intrinsic value
Multi-Tasking
Qualitative
Lattice
Routers
7. Sudden rise in voltage in the power supply.
Surge
Liability
Multi-Tasking
Identification
8. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Workaround Procedures
File Server
Hacker
Civil Law
9. Program that inappropriately collects private data or activity
Security Domain
Spyware
Procedure
Complete
10. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Birthday Attack
Authorization
Checklist Test (desk check)
Business Continuity Steering Committee
11. Actions measured against either a policy or what a reasonable person would do
Denial Of Service
Data Integrity
Due Diligence
Civil Or Code Law
12. Moving the alphabet intact a certain number spaces
Life Cycle of Evidence
Administrative Laws
Shift Cipher (Caesar)
Triage
13. One entity with two competing allegiances
Pervasive Computing and Mobile Computing Devices
Conflict Of Interest
Class
Logic Bomb
14. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Site Policy
Structured Walkthrough
User
File Shadowing
15. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Enticement
Strategic
DR Or BC Coordinator
Orange Book B2 Classification
16. Prolonged loss of commercial power
Transients
5 Rules Of Evidence
Blackout
Disaster Recovery Tape
17. Narrow scope examination of a system
Cryptovariable
Targeted Testing
Permutation /Transposition
Buffer Overflow
18. Natural or human-readable form of message
Plain Text
Relocation
Tactical
Running Key
19. A type a computer memory that temporarily stores frequently used information for quick access.
Payload
Object Reuse
Orange Book D Classification
Cache
20. Trading one for another
Steganography
Data Dictionary
Substitution
Trademark
21. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Data Custodian
Executive Succession
Common Law
Cryptology
22. Planning with a goal of returning to the normal business function
Object Oriented Programming (OOP)
Restoration
Information Flow Model
Enticement
23. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. To break a business process into separate functions and assign to different people
False Negative
Standalone Test
Compiler
Separation Of Duties
25. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Fire Classes
TEMPEST
Call Tree
Standard
26. People who interact with assets
Fragmented Data
User
Custodian
Structured Walk-Through Test
27. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Deterrent
Full-Interruption test
Mobile Recovery
Public Key Infrastructure (PKI)
28. A state where two subjects can access the same object without proper mediation
Race Condition
Cross Certification
Prevention
Transfer
29. Impossibility of denying authenticity and identity
Microwave
Data Backups
Spiral
Non-Repudiation
30. Most granular organization of controls
User Mode (problem or program state)
EMI
Control Category
Site Policy
31. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Security Blueprint
Administrative Laws
Data Owner
Incident Response
32. Something that happened
Disk Mirroring
Event
Wait
Hot Spares
33. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Checklist Test (desk check)
Walk Though
Attacker (Black hat - Hacker)
34. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Confidence Value
Processes are Isolated By
Recovery
Hash Function
35. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Business Unit Recovery
Risk Mitigation
Operational Impact Analysis
Custodian
36. Maintenance procedures outline the process for the review and update of business continuity plans.
Plan Maintenance Procedures
Data Diddler
Watermarking
Capability Tables
37. A risk assessment method - measurable real money cost
Packet Filtering
Mandatory Access Control (MAC)
Quantitative
Disaster Recovery Teams (Business Recovery Teams)
38. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Privacy Laws
TIFF (Tagged Image File Format)
Processes are Isolated By
Inheritance
39. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Private Branch Exchange (PBX)
Routers
Concatenation
Shielding
40. Written suggestions that direct choice to a few alternatives
Orange Book B2 Classification
Checkpoint
Guidelines
Stopped
41. Act of luring an intruder and is legal.
Business Recovery Team
Secondary Storage
Site Policy
Enticement
42. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Highly Confidential
Content Dependent Access Control
Byte Level Deletion
Durability
43. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Incident
Walk Though
Cross-Site Scripting
Alert
44. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Forensic Copy
Basics Of Secure Design
Privacy Laws
Remote Journaling
45. Granular decision by a system of permitting or denying access to a particular resource on the system
Authorization
Concatenation
Elements of Negligence
Redundant Servers
46. A secure connection to another network.
Strategic
Contact List
Gateway
Waterfall
47. OOP concept of an object at runtime
Instance
Denial Of Service
Classification Scheme
Alert
48. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Privacy Laws
Identification
Exercise
Polyalphabetic
49. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Trade Secret
Triage
Code
Business Recovery Timeline
50. Induces a crime - tricks a person - and is illegal
Entrapment
JPEG (Joint Photographic Experts Group)
Checksum
Marking