SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A database that contains the name - type - range of values - source and authorization for access for each data element
Hearsay Evidence
Data Dictionary
Non-Repudiation
Service Bureau
2. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Liability
Recovery Period
War Dialing
Integrated Test
3. A race condition where the security changes during the object's access
Patent
3 Types of harm Addressed in computer crime laws
Time Of Check/Time Of Use
Internal Use Only
4. Malware that makes small random changes to many data points
Cryptovariable
Computer Forensics
Data Diddler
Liability
5. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Shielding
Infrastructure
MOM
Operational Impact Analysis
6. Responsibility for actions
Remote Journaling
Liability
Fiber Optics
File
7. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Active Data
Residual Risk
Satellite
User
8. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Modification
Infrastructure
Highly Confidential
Incident Response
9. Transaction controls for a database - a return to a previous state
Rollback
Open Mail Relay Servers
Embedded
Record Level Deletion
10. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Full Test (Full Interruption)
Intrusion Prevention Systems
Buffer Overflow
Multiplexers
11. Communicate to stakeholders
Gateway
Debriefing/Feedback
File Shadowing
Transfer
12. A control after attack
Countermeasure
Restoration
Business Impact Analysis
Secondary Storage
13. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Data Recovery
Initialization Vector
Information Technology Security Evaluation Criteria - ITSEC
Restoration
14. Asymmetric encryption of a hash of message
High-Risk Areas
Burn
Radio Frequency Interference (RFI)
Digital Signature
15. An administrative unit or a group of objects and subjects controlled by one reference monitor
Relocation
Emanations
Spyware
Security Domain
16. Recovery alternative - short-term - high cost movable processing location
User Mode (problem or program state)
Mobile Site
Rogue Access Points
Concatenation
17. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Common Criteria
Instance
Chain of Custody
Hot Spares
18. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Integrated Test
Declaration
2-Phase Commit
Access Point
19. Potential danger to information or systems
Standalone Test
User Mode (problem or program state)
Alert
Threats
20. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Criminal Law
Transients
Triage
Exercise
21. Line noise that is superimposed on the supply circuit.
Embedded
Forensic Copy
Operating
Transients
22. Using small special tools all tumblers of the lock are aligned - opening the door
Mirroring
Electromagnetic Interference (EMI)
Picking
Boot (V.)
23. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Cache
Hard Disk
Need-To-Know
Memory Management
24. Pertaining to law - no omissions
Triage
Complete
Orange Book B2 Classification
Orange Book C Classification
25. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Fire Classes
Mirroring
Kerberos
Incident Response
26. Can be statistical (monitor behavior) or signature based (watch for known attacks)
Desk Check Test
IDS Intrusion Detection System
Hijacking
Multiplexers
27. A physical enclosure for verifying identity before entry to a facility
Object
Non-Discretionary Access Control
Surge
Mantrap (Double Door System)
28. A planned or unplanned interruption in system availability.
Multi-Programming
Classification
System Downtime
Control Type
29. Recording activities at the keyboard level
Alternate Data Streams (File System Forks)
Keystroke Logging
Administrative Laws
Certificate Revocation List (CRL)
30. A process state - to be executing a process on the CPU
Total Risk
Alternate Site
Data Dictionary
Running
31. Calculation encompassing threats - vulnerabilities and assets
Total Risk
Change Control
State Machine Model
Honeypot
32. The study of cryptography and cryptanalysis
Data Leakage
Structured Walkthrough
Cryptology
Recovery
33. A device that sequentially switches multiple analog inputs to the output.
Locard's Principle
Multiplexers
Incident Handling
Sniffing
34. Lower frequency noise
Full-Interruption test
Business Recovery Team
Uninterruptible Power Supply (UPS)
Radio Frequency Interference (RFI)
35. Creation distribution update and deletion
Checklist Test
Hard Disk
Key Management
High-Risk Areas
36. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
Change Control
Damage Assessment
Targeted Testing
Threads
37. Another subject cannot see an ongoing or pending update until it is complete
Mandatory
Hacker
Isolation
Security Domain
38. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Forensic Copy
Prevention
Fault Tolerance
Entrapment
39. Outputs within a given function are the same result
Side Channel Attack
Collisions
Fault
Alert/Alarm
40. To execute more than one instruction at an instant in time
CobiT
Multi-Processing
Safeguard
Pervasive Computing and Mobile Computing Devices
41. Vehicle stopping object
Assembler
Sniffing
Bollard
Wait
42. Quantity of risk remaining after a control is applied
Fragmented Data
Top Secret
Reciprocal Agreement
Residual Risk
43. A Denial of Service attack that floods the target system with connection requests that are not finalized.
SYN Flooding
Critical Functions
UPS
Operational
44. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Emergency Operations Center (EOC)
Data Integrity
Worm
Classification Scheme
45. A basic level of network access control that is based upon information contained in the IP packet header.
Packet Filtering
Primary Storage
Separation Of Duties
Intrusion Prevention Systems
46. A trusted issuer of digital certificates
Residual Data
Certification Authority
Compression
Orange Book B1 Classification
47. Used to code/decode a digital data stream.
Mock Disaster
Bumping
Recovery
Codec
48. An alert or alarm that is triggered when no actual attack has taken place
Critical Records
Detection
False (False Positive)
Patch Management
49. A backup type which creates a complete copy
Custodian
Remote Access Trojan
ff Site
Replication
50. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Data Owner
Declaration
Cryptography