SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Processes are Isolated By
Plaintext
Ring Protection
Multi-Core
2. Record of system activity - which provides for monitoring and detection.
Near Site
Log
Reciprocal Agreement
Time Of Check/Time Of Use
3. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Concentrator
Operational Exercise
Containment
Data Warehouse
4. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Analysis
Copyright
Locard's Principle
Criminal Law
5. Pertaining to law - no omissions
Mantrap (Double Door System)
Mobile Recovery
Complete
CPU Cache
6. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Database Shadowing
Moore's Law
Restoration
Fragmented Data
7. Malware that makes small random changes to many data points
Data Diddler
Digital Signature
Private Branch Exchange (PBX)
Workaround Procedures
8. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Least Privilege
Interpreter
Hard Disk
File
9. A Denial of Service attack that floods the target system with connection requests that are not finalized.
SYN Flooding
Need-To-Know
File Extension
Switches
10. Mediation of covert channels must be addressed
Data Backups
Information Flow Model
Failure Modes and Effect Analysis (FEMA)
BCP Testing Drills and Exercises
11. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Top Secret
User Mode (problem or program state)
Man-In-The-Middle Attack
Encapsulation
12. To smooth out reductions or increases in power
UPS
IDS Intrusion Detection System
Classification Scheme
Deadlock
13. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Checklist Test (desk check)
Inrush Current
Reciprocal Agreement
Accreditation
14. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Simulation
Warm Site
Intrusion Prevention Systems
Overlapping Fragment Attack
15. Something that happened
Recovery Time Objectives
Digital Signature
Event
Computer Forensics
16. Amount of time for restoring a business process or function to normal operations without major loss
User Mode (problem or program state)
SQL Injection
Relocation
Maximum Tolerable Downtime (MTD)
17. Dedicated fast memory located on the same board as the CPU
Off-Site Storage
CPU Cache
Fiber Optics
Mobile Site
18. To jump to a conclusion
Plain Text
Contact List
Inference
Initialization Vector
19. Real-time data backup ( Data Mirroring)
Satellite
Journaling
Central Processing Unit (CPU)
Database Shadowing
20. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Highly Confidential
Keystroke Logging
Test Plan
Forensic Copy
21. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Copyright
Job Training
CPU Cache
Data Integrity
22. Final purpose or result
Payload
Remote Access Trojan
Shielding
Fire Prevention
23. Independent malware that requires user interaction to execute
Machine Language (Machine Code)
The ACID Test
State Machine Model
Virus
24. What is will remain - persistence
Birthday Attack
IP Fragmentation
Durability
BCP Testing Drills and Exercises
25. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
True Attack Stimulus
Teardrop
Cookie
Security Domain
26. Data or interference that can trigger a false positive
Resumption
Noise
E-Mail Spoofing
Patch Panels
27. State of computer - to be running a process
Operating
Surveillance
Message Digest
Analysis
28. A shield against leakage of electromagnetic signals.
Faraday Cage/ Shield
Remote Access Trojan
Honeypot
Confidence Value
29. More than one process in the middle of executing at a time
Blind Testing
Malformed Input
Multi-Tasking
Injection
30. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Masked/Interruptible
Electronic Vaulting
Firewalls
Data Dictionary
31. Potential danger to information or systems
Codec
Threats
Business Continuity Steering Committee
Microwave
32. Planning with a goal of returning to the normal business function
Computer Forensics
Rollback
Business Interruption Insurance
Restoration
33. Creation distribution update and deletion
Key Management
Smurf
Trojan Horse
Asymmetric
34. The guardian of asset(s) - a maintenance activity
Enticement
Plan Maintenance Procedures
Fiber Optics
Custodian
35. Periodic - automatic and transparent backup of data in bulk.
Electronic Vaulting
Accountability
Symmetric
File Server
36. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Intrusion Detection Systems
Object
Quantitative Risk Analysis
Vital Record
37. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Access Control Attacks
Data Recovery
Near Site
Activation
38. A planned or unplanned interruption in system availability.
Sequence Attacks
Contact List
System Downtime
Data Recovery
39. Low level - pertaining to planning
Switches
Supervisor Mode (monitor - system - privileged)
Embedded Systems
Tactical
40. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Forging of an IP address.
IP Address Spoofing
Shadowing (file shadowing)
False Negative
Fault Tolerance
42. Can be statistical (monitor behavior) or signature based (watch for known attacks)
Coaxial Cable
SYN Flooding
IDS Intrusion Detection System
Keystroke Logging
43. System directed mediation of access with labels
Supervisor Mode (monitor - system - privileged)
Mandatory Access Control (MAC)
Liability
Mandatory
44. Pertaining to law - accepted by a court
EMI
Computer Forensics
Admissible
The ACID Test
45. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Polyalphabetic
Running
Asymmetric
Network Attached Storage (NAS)
46. To reduce fire
Fire Suppression
Injection
Administrative Access Controls
Algorithm
47. High frequency noise
Operational Exercise
Shielding
Electromagnetic Interference (EMI)
Compiler
48. Reprogrammable basic startup instructions
Recovery Time Objectives
Firmware
Hijacking
Capability Tables
49. Outputs within a given function are the same result
Collisions
Analysis
Labeling
Algorithm
50. Return to a normal state
Recovery
Wireless Fidelity (Wi-Fi )
Log
Intrusion Detection Systems