SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Governance
Brouter
Triage
Business Interruption Insurance
2. Maintenance procedures outline the process for the review and update of business continuity plans.
Plan Maintenance Procedures
Bridge
Data Custodian
Running Key
3. Some systems are actually run at the alternate site
Parallel Test
Interference (Noise)
Eavesdropping
War Dialing
4. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Business Unit Recovery
Data Diddler
Custodian
Fiber Optics
5. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Overlapping Fragment Attack
Rollback
Recovery Period
Object Oriented Programming (OOP)
6. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Message Digest
Cold Site
Hot Site
Alert
7. An attack involving the hijacking of a TCP session by predicting a sequence number.
Education
Method
Orange Book B1 Classification
Sequence Attacks
8. Control type- that is communication based - typically written or oral
Active Data
Administrative
Operational
Access Control
9. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Orange Book A Classification
Collisions
Compensating
Data Backup Strategies
10. Responsibility for actions
Criminal Law
Fragmented Data
Liability
Accreditation
11. A subnetwork with storage devices servicing all servers on the attached network.
Sharing
Storage Area Network (SAN)
Journaling
Distributed Denial Of Service
12. RADIUS - TACACS+ - Diameter
Centralized Access Control Technologies
Key Management
Encapsulation
Pervasive Computing and Mobile Computing Devices
13. A covert storage channel on the file attribute
Alternate Data Streams (File System Forks)
Mock Disaster
Faraday Cage/ Shield
Countermeasure
14. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Separation Of Duties
Call Tree
Fraggle
Covert Channel
15. Those who initiate the attack
Threat Agent
Smurf
Business Continuity Planning (BCP)
Threads
16. A telephone exchange for a specific office or business.
One Time Pad
Ring Protection
Confidence Value
Private Branch Exchange (PBX)
17. Small data files written to a user's hard drive by a web server.
Concentrator
Cookie
Patch Management
File Server
18. Malware that makes small random changes to many data points
Residual Risk
Injection
Threats
Data Diddler
19. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Content Dependent Access Control
Critical Infrastructure
Orange Book B2 Classification
Classification Scheme
20. Using small special tools all tumblers of the lock are aligned - opening the door
Side Channel Attack
Hash Function
Picking
Remanence
21. Written suggestions that direct choice to a few alternatives
Guidelines
Threats
Trade Secret
Alert
22. Unsolicited commercial email
Spam
BCP Testing Drills and Exercises
Recovery Time Objectives
Data Leakage
23. Key
Byte Level Deletion
System Downtime
Cryptovariable
Need-To-Know
24. Lower frequency noise
Radio Frequency Interference (RFI)
Message Digest
Mixed Law System
Algorithm
25. A control before attack
Business Unit Recovery
Security Domain
Safeguard
Accountability
26. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Tapping
Orange Book A Classification
Masked/Interruptible
TEMPEST
27. Indivisible - data field must contain only one value that either all transactions take place or none do
Firmware
Hacker
Atomicity
Class
28. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Waterfall
Structured Walkthrough
Malformed Input
Worldwide Interoperability for Microwave Access (WI-MAX )
29. Threats x Vulnerability x Asset Value = Total Risk
E-Mail Spoofing
Total Risk
Disaster Recovery Plan
Replication
30. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
JPEG (Joint Photographic Experts Group)
Burn
Picking
Classification Scheme
31. Subset of operating systems components dedicated to protection mechanisms
Processes are Isolated By
Security Kernel
Spam
Trade Secret
32. Is secondhand and usually not admissible in court
Compensating
Complete
Running Key
Hearsay Evidence
33. The partial or full duplication of data from a source database to one or more destination databases.
Simulation
Database Replication
Fault
Admissible
34. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Security Domain
Business Interruption
Complete
Voice Over IP (VOIP)
35. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Birthday Attack
Alert/Alarm
Embedded Systems
Residual Risk
36. Mediation of covert channels must be addressed
Gateway
Debriefing/Feedback
Recovery Time Objectives
Information Flow Model
37. Amount of time for restoring a business process or function to normal operations without major loss
War Driving
Site Policy
Infrastructure
Maximum Tolerable Downtime (MTD)
38. A process state - to be executing a process on the CPU
Running
Education
Need-To-Know
Worldwide Interoperability for Microwave Access (WI-MAX )
39. A passive network attack involving monitoring of traffic.
Compartmentalize
Eavesdropping
Multi-Tasking
Integrated Test
40. A choice in risk management - to implement a control that limits or lessens negative effects
Enticement
Infrastructure
Mitigate
Control
41. Regular operations are stopped and where processing is moved to the alternate site.
Surge
Hard Disk
Full-Interruption test
Alarm Filtering
42. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Privacy Laws
Prevention
Replication
Strong Authentication
43. Memory management technique that allows two processes to run concurrently without interaction
Protection
Recovery Strategy
Operational Impact Analysis
Fire Classes
44. A type of multitasking that allows for more even distribution of computing time among competing request
Preemptive
Recovery Period
Assembler
Logic Bomb
45. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
File Sharing
Embedded
Common Criteria
UPS
46. A control after attack
Packet Filtering
Countermeasure
Distributed Denial Of Service
Control Category
47. Of a system without prior knowledge by the tester or the tested
Triage
Capability Tables
Blackout
Double Blind Testing
48. Independent malware that requires user interaction to execute
Virus
Central Processing Unit (CPU)
3 Types of harm Addressed in computer crime laws
Sag/Dip
49. For PKI - decertify an entities certificate
Containment
Digital Signature
Cookie
Revocation
50. Vehicle or tool that exploits a weakness
Kerckhoff's Principle
Threats
One Time Pad
Gateway