SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Hacker
Relocation
Distributed Processing
Data Recovery
2. Intermediate level - pertaining to planning
Lattice
Call Tree
Operational
Orange Book B2 Classification
3. Written core statements that rarely change
Hot Site
Remanence
Proxies
Policy
4. More than one CPU on a single board
Multi-Core
Reference Monitor
Directive
War Driving
5. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
TIFF (Tagged Image File Format)
Object Reuse
E-Mail Spoofing
Threats
6. Wrong against society
Remote Journaling
Criminal Law
TIFF (Tagged Image File Format)
Containment
7. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Disaster Recovery Tape
Containment
Orange Book B1 Classification
Symmetric
8. The guardian of asset(s) - a maintenance activity
Custodian
Deterrent
Common Law
System Life Cycle
9. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Deterrent
Data Dictionary
Job Rotation
Call Tree
10. Individuals and departments responsible for the storage and safeguarding of computerized data.
Site Policy Awareness
Data Custodian
Orange Book C2 Classification
Open Mail Relay Servers
11. Code breaking - practice of defeating the protective properties of cryptography.
Microwave
Moore's Law
Cryptanalysis
Tapping
12. Written step-by-step actions
Procedure
Criminal Law
Disaster Recovery Teams (Business Recovery Teams)
Storage Area Network (SAN)
13. Process of statistically testing a data set for the likelihood of relevant information.
Due Care
Confidence Value
Sampling
Non-Repudiation
14. For PKI - decertify an entities certificate
Interception
Discretionary
Remote Journaling
Revocation
15. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Disaster
Encipher
Forensic Copy
Prevention
16. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
E-Mail Spoofing
Simulation
Residual Data
Administrative
17. To reduce fire
Fire Suppression
TIFF (Tagged Image File Format)
Microwave
Denial Of Service
18. A condition in which neither party is willing to stop their activity for the other to complete
Private Branch Exchange (PBX)
Deadlock
Legacy Data
Orange Book B2 Classification
19. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Trojan Horse
Business Recovery Team
War Driving
Uninterruptible Power Supply (UPS)
20. A Trojan horse with the express underlying purpose of controlling host from a distance
Legacy Data
Message Digest
Civil Law
Remote Access Trojan
21. Return to a normal state
Recovery
Smurf
Multi-Party Control
ff Site
22. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Encryption
Binary
File Server
Forensic Copy
23. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Spyware
Dictionary Attack
Walk Though
Entrapment
24. To execute more than one instruction at an instant in time
Life Cycle of Evidence
Mantrap (Double Door System)
Multi-Processing
Data Diddler
25. Planning with a goal of returning to the normal business function
On-Site
Layering
Analysis
Restoration
26. Reduction of voltage by the utility company for a prolonged period of time
Brownout
Business Recovery Timeline
Compiler
5 Rules Of Evidence
27. A state where two subjects can access the same object without proper mediation
SQL Injection
Hub
Race Condition
Life Cycle of Evidence
28. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Emergency
Critical Records
Checksum
Conflict Of Interest
29. Unauthorized wireless network access device.
Rogue Access Points
Structured Walk-Through Test
Double Blind Testing
Life Cycle of Evidence
30. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Test Plan
2-Phase Commit
Hot Spares
Deleted File
31. Weakness or flaw in an asset
Administrative Law
Backup
Vulnerability
Criminal Law
32. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Fire Classes
Life Cycle of Evidence
Call Tree
Mandatory Access Control (MAC)
33. Communication of a security incident to stakeholders and data owners.
Capability Tables
Recovery
Notification
Emergency Procedures
34. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Directive
Critical Infrastructure
Recovery Period
Electrostatic Discharge
35. Fault tolerance for power
Control Type
Residual Risk
Generator
Total Risk
36. The hard drive
Cross Certification
SYN Flooding
Key Space
Secondary Storage
37. Communicate to stakeholders
Mock Disaster
Debriefing/Feedback
Prevention
Operational
38. A risk assessment method - intrinsic value
Record Level Deletion
Restoration
Qualitative
Phishing
39. OOP concept of a taking attributes from the original or parent
Critical Records
Hearsay Evidence
Inheritance
Phishing
40. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
Proprietary
Wait
Residual Data
Damage Assessment
41. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Consistency
Simulation Test
Boot (V.)
ITSEC
42. A passive network attack involving monitoring of traffic.
Highly Confidential
Eavesdropping
Procedure
Record Level Deletion
43. Independent malware that requires user interaction to execute
Mobile Recovery
Collisions
Orange Book B1 Classification
Virus
44. A distributed system's transaction control that requires updates to complete or rollback
Processes are Isolated By
Degauss
Conflict Of Interest
2-Phase Commit
45. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Botnet
Business Impact Analysis
CobiT
Discretionary Access Control (DAC)
46. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Civil Or Code Law
Fault Tolerance
Virtual Memory
Information Risk Management (IRM)
47. A programming design concept which abstracts one set of functions from another in a serialized fashion
Compensating
Risk Mitigation
Layering
Physical Tampering
48. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Tar Pits
Boot (V.)
Investigation
Fraggle
49. Inference about encrypted communications
Highly Confidential
Orange Book D Classification
Alternate Site
Side Channel Attack
50. A electronic attestation of identity by a certificate authority
Digital Certificate
Hacker
Mixed Law System
Polyalphabetic