SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Key Space
Maximum Tolerable Downtime (MTD)
Honeypot
Checklist Test
2. Malware that makes many small changes over time to a single data point or system
Vulnerability
Salami
BCP Testing Drills and Exercises
Compensating
3. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Electronic Vaulting
Polymorphism
TEMPEST
Backup
4. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
5 Rules Of Evidence
Key Escrow
Identification
Bit
5. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Operational Impact Analysis
Multi-Processor
User Mode (problem or program state)
Digital Signature
6. Communication of a security incident to stakeholders and data owners.
Privacy Laws
Contact List
Embedded
Notification
7. An encryption method that has a key as long as the message
Running Key
Event
Certificate Revocation List (CRL)
Information Owner
8. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
ff Site
Corrective
Embedded
Initialization Vector
9. An event which stops business from continuing.
Access Control Matrix
Logic Bomb
Business Interruption Insurance
Disaster
10. To jump to a conclusion
Business Continuity Planning (BCP)
Inference
The ACID Test
Archival Data
11. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Admissible
File Shadowing
Alert/Alarm
Data Leakage
12. Employment education done once per position or at significant change of function
Job Training
Standalone Test
Logic Bomb
Remanence
13. Mediation of covert channels must be addressed
Copyright
Triage
Territoriality
Information Flow Model
14. Control category - more than one control on a single asset
Compensating
Waterfall
Examples of technical security components
Fraggle
15. Maximum tolerance for loss of certain business function - basis of strategy
Digital Signature
Restoration
Information Owner
Recovery Time Objectives
16. Mitigate damage by isolating compromised systems from the network.
Marking
Containment
Recovery Time Objectives
Microwave
17. RADIUS - TACACS+ - Diameter
Off-Site Storage
Centralized Access Control Technologies
Examples of non-technical security components
Salami
18. Granular decision by a system of permitting or denying access to a particular resource on the system
Preemptive
Risk
Authorization
Method
19. Just enough access to do the job
Analysis
Recovery
Least Privilege
Fault
20. Written step-by-step actions
Infrastructure
Procedure
Cryptanalysis
Binary
21. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Shift Cipher (Caesar)
Plaintext
Detective
Covert Channel
22. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Strong Authentication
Access Control
Initialization Vector
Total Risk
23. A software design technique for abstraction of a process
Data Hiding
SQL Injection
Central Processing Unit (CPU)
Disaster Recovery Tape
24. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Bit
Business Continuity Steering Committee
Inheritance
Acronym for American Standard Code for Information Interchange (ASCII)
25. Record history of incident
Permutation /Transposition
Tracking
Trademark
Fragmented Data
26. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Threats
Business Continuity Planning (BCP)
Mobile Site
TIFF (Tagged Image File Format)
27. Mediation of subject and object interactions
Tapping
IDS Intrusion Detection System
Botnet
Access Control
28. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Metadata
Confidence Value
Mobile Recovery
Electromagnetic Interference (EMI)
29. To segregate for the purposes of labeling
Radio Frequency Interference (RFI)
Checksum
The ACID Test
Compartmentalize
30. Hiding the fact that communication has occurred
Due Diligence
Polyalphabetic
Steganography
Crisis
31. Provides a physical cross connect point for devices.
Patch Panels
Instance
Vital Record
Convincing
32. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Business Impact Analysis
Common Criteria
System Downtime
Modification
33. Control category- to record an adversary's actions
On-Site
Noise
Detective
Declaration
34. Short period of low voltage.
Data Backups
Sag/Dip
Forensic Copy
Preemptive
35. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Ethics
Critical Infrastructure
Technical Access Controls
Risk Assessment / Analysis
36. A database backup type which records at the transaction level
Spiral
Remote Journaling
Basics Of Secure Design
Object Oriented Programming (OOP)
37. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Governance
Fire Detection
Hub
Hacker
38. Mitigation of system or component loss or interruption through use of backup capability.
On-Site
Debriefing/Feedback
Analysis
Fault Tolerance
39. A Denial of Service attack that floods the target system with connection requests that are not finalized.
Botnet
Business Interruption Insurance
SYN Flooding
Electronic Vaulting
40. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
File Extension
Recovery Strategy
False Negative
Content Dependent Access Control
41. Record of system activity - which provides for monitoring and detection.
Criminal Law
Exercise
Digital Signature
Log
42. A telephone exchange for a specific office or business.
Private Branch Exchange (PBX)
Fault
BCP Testing Drills and Exercises
Business Continuity Program
43. A passive network attack involving monitoring of traffic.
Eavesdropping
Covert Channel
Backup
Information Technology Security Evaluation Criteria - ITSEC
44. Unsolicited advertising software
Masked/Interruptible
Centralized Access Control Technologies
File Sharing
Adware
45. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Targeted Testing
Classification Scheme
Covert Channel
Certification Authority
46. Business and technical process of applying security software updates in a regulated periodic way
Guidelines
File Level Deletion
On-Site
Patch Management
47. One entity with two competing allegiances
Mantrap (Double Door System)
Kerberos
Conflict Of Interest
Data Marts
48. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Protection
Database Shadowing
Marking
Encryption
49. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Access Control Attacks
Mixed Law System
Byte Level Deletion
Proxies
50. Act of luring an intruder and is legal.
Threats
Fault Tolerance
Enticement
File Level Deletion