SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Real-time data backup ( Data Mirroring)
Malformed Input
Entrapment
Hearsay Evidence
Database Shadowing
2. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Cookie
Object Reuse
Basics Of Secure Design
Alternate Site
3. Recognition of an individual's assertion of identity.
Archival Data
Identification
Test Plan
Due Care
4. Object based description of a system or a collection of resources
Cookie
Twisted Pair
Kernel
Access Control Matrix
5. What is will remain - persistence
Hot Spares
Adware
Surge Suppressor
Durability
6. An alert or alarm that is triggered when no actual attack has taken place
Activation
Concentrator
Supervisor Mode (monitor - system - privileged)
False (False Positive)
7. Intermediate level - pertaining to planning
Debriefing/Feedback
Encryption
Operational
Total Risk
8. Moving letters around
Cookie
Permutation /Transposition
Burn
Incident
9. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Operating
Public Key Infrastructure (PKI)
CobiT
Secondary Storage
10. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Virus
Alternate Data Streams (File System Forks)
Residual Data
Residual Risk
11. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Control Type
Pervasive Computing and Mobile Computing Devices
Privacy Laws
Open Mail Relay Servers
12. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Log
Risk Mitigation
Fire Classes
Man-In-The-Middle Attack
13. A layer 2 device that used to connect two or more network segments and regulate traffic.
Remote Access Trojan
Switches
Cross-Site Scripting
Denial Of Service
14. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Byte
Disaster Recovery Teams (Business Recovery Teams)
Rollback
Standard
15. Outputs within a given function are the same result
Incident Handling
Privacy Laws
Collisions
Computer System Evidence
16. A software design technique for abstraction of a process
Data Hiding
Warm Site
Metadata
Monitor
17. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
CobiT
Strong Authentication
Framework
One Time Pad
18. Evidence must be: admissible - authentic - complete - accurate - and convincing
Object Oriented Programming (OOP)
Voice Over IP (VOIP)
Electronic Vaulting
5 Rules Of Evidence
19. Highest level of authority at EOC with knowledge of the business process and the resources available
Accurate
Incident Manager
Access Control Lists
Blackout
20. Object reuse protection and auditing
Orange Book C2 Classification
Plan Maintenance Procedures
Recovery Period
Reciprocal Agreement
21. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
System Life Cycle
Electronic Vaulting
Off-Site Storage
Locard's Principle
22. Someone who want to know how something works - typically by taking it apart
Labeling
False Negative
Hacker
Concentrator
23. A system that enforces an access control policy between two networks.
Multi-Party Control
Firewalls
Fire Suppression
Mandatory
24. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
File Server
Information Risk Management (IRM)
ISO/IEC 27002
Central Processing Unit (CPU)
25. Unauthorized access of network devices.
Near Site
HTTP Response Splitting
Physical Tampering
Private Branch Exchange (PBX)
26. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Incident Response Team
Administrative Laws
Data Recovery
Examples of non-technical security components
27. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Overlapping Fragment Attack
Moore's Law
Masquerading
Hard Disk
28. Employment education done once per position or at significant change of function
Log
Sharing
Job Training
Complete
29. Planning with a goal of returning to the normal business function
Residual Data
Restoration
On-Site
JPEG (Joint Photographic Experts Group)
30. Recovery alternative - short-term - high cost movable processing location
Microwave
Off-Site Storage
Mobile Site
Digital Certificate
31. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Recovery Strategy
Encryption
Administrative Laws
Safeguard
32. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Hearsay
Disaster
Supervisor Mode (monitor - system - privileged)
Network Attached Storage (NAS)
33. A documented battle plan for coordinating response to incidents.
Incident Handling
Crisis
Privacy Laws
File Sharing
34. Prolonged loss of commercial power
Blackout
Hacker
Deleted File
Replication
35. Part of a transaction control for a database which informs the database of the last recorded transaction
Disk Mirroring
Bit
Recovery Strategy
Checkpoint
36. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Digital Certificate
Computer Forensics
Cryptovariable
Embedded Systems
37. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Classification Scheme
Interception
Multi-Tasking
Plain Text
38. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Emergency Procedures
Authorization
Risk Assessment
Access Control Matrix
39. A backup of data located where staff can gain access immediately
Emanations
On-Site
Warm Site
Alternate Data Streams (File System Forks)
40. A telephone exchange for a specific office or business.
Private Branch Exchange (PBX)
Restoration
Simulation
Procedure
41. Written suggestions that direct choice to a few alternatives
User
Distributed Denial Of Service
Object Oriented Programming (OOP)
Guidelines
42. A race condition where the security changes during the object's access
Cryptology
False Negative
Time Of Check/Time Of Use
Authentic
43. High level design or model with a goal of consistency - integrity - and balance
Non-Discretionary Access Control
Architecture
Symmetric
Fire Detection
44. Uncheck data input which results in redirection
Walk Though
HTTP Response Splitting
Mantrap (Double Door System)
ff Site
45. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Discretionary Access Control (DAC)
Labeling
Remote Access Trojan
Bit
46. Recording the Who What When Where How of evidence
Failure Modes and Effect Analysis (FEMA)
Control
Assembler
Chain Of Custody
47. Total number of keys available that may be selected by the user of a cryptosystem
Masquerading
Key Space
Double Blind Testing
Buffer Overflow
48. Mitigate damage by isolating compromised systems from the network.
Containment
Rootkit
Trojan Horse
Voice Over IP (VOIP)
49. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Boot (V.)
Critical Functions
Time Of Check/Time Of Use
Memory Management
50. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Multi-Party Control
BCP Testing Drills and Exercises
Authorization
Security Domain