SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Real-time data backup ( Data Mirroring)
Byte Level Deletion
Risk Assessment / Analysis
Database Shadowing
Deleted File
2. A backup type which creates a complete copy
Incident
Hash Function
Trade Secret
Replication
3. A test conducted on one or more components of a plan under actual operating conditions.
Man-In-The-Middle Attack
Operational Test
Notification
Method
4. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Stopped
Secondary Storage
Certificate Revocation List (CRL)
Critical Infrastructure
5. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Structured Walkthrough
Incident Response Team
Tracking
Running Key
6. Program that inappropriately collects private data or activity
Reference Monitor
Centralized Access Control Technologies
Mixed Law System
Spyware
7. Renders the record inaccessible to the database management system
Parallel Test
Layering
Inrush Current
Record Level Deletion
8. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Symmetric
Site Policy Awareness
Test Plan
Criminal Law
9. To smooth out reductions or increases in power
Bollard
Trojan Horse
Structured Walkthrough
UPS
10. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Mock Disaster
Hot Site
Running
Fragmented Data
11. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Hijacking
ISO/IEC 27001
Reference Monitor
12. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Injection
Alert
Acronym for American Standard Code for Information Interchange (ASCII)
Copyright
13. To jump to a conclusion
Safeguard
Multi-Core
Inference
Transients
14. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Rogue Access Points
Interception
Polymorphism
Alarm Filtering
15. Requirement of access to data for a clearly defined purpose
Satellite
Need-To-Know
Central Processing Unit (CPU)
Plaintext
16. Reduces causes of fire
Checklist Test (desk check)
Mirrored Site
Fire Prevention
Recovery Time Objectives
17. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Digital Signature
Repeaters
Containment
5 Rules Of Evidence
18. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Embedded
Information Risk Management (IRM)
Common Law
Top Secret
19. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Orange Book C Classification
Civil Or Code Law
Event
Civil Law
20. A group or network of honeypots
Examples of non-technical security components
Honeynet
Cipher Text
Faraday Cage/ Shield
21. Natural or human-readable form of message
Plain Text
Blackout
Capability Tables
Modems
22. Mathematical function that determines the cryptographic operations
Honeynet
Source Routing Exploitation
Algorithm
Plain Text
23. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Active Data
Hub
Information Owner
HTTP Response Splitting
24. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Database Replication
War Dialing
Brownout
Worldwide Interoperability for Microwave Access (WI-MAX )
25. Outputs within a given function are the same result
Remote Journaling
UPS
Embedded
Collisions
26. What is will remain - persistence
Durability
Due Diligence
Key Escrow
Technical Access Controls
27. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
ISO/IEC 27001
Top Secret
Complete
Repeaters
28. A process state - (blocked) needing input before continuing
Cross Training
Forward Recovery
Access Control Lists
Wait
29. Abstract and mathematical in nature - defining all possible states - transitions and operations
Prevention
Message Digest
State Machine Model
File
30. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Standalone Test
Qualitative
Corrective
Radio Frequency Interference (RFI)
31. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Race Condition
Risk Assessment / Analysis
Brute Force
Masked/Interruptible
32. Power surge
Initialization Vector
Code
Multilevel Security System
Electrostatic Discharge
33. Written suggestions that direct choice to a few alternatives
Guidelines
Call Tree
Byte Level Deletion
Discretionary
34. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Data Dictionary
Polymorphism
Risk Mitigation
Basics Of Secure Design
35. Review of data
Disaster
Enticement
Recovery Time Objectives
Analysis
36. A record that must be preserved and available for retrieval if needed.
Patch Management
Vital Record
Authorization
Orange Book B2 Classification
37. Recovery alternative - complete duplication of services including personnel
Enticement
Disaster
Routers
Mirrored Site
38. Eavesdropping on network communications by a third party.
Database Replication
Acronym for American Standard Code for Information Interchange (ASCII)
ISO/IEC 27002
Sniffing
39. High level design or model with a goal of consistency - integrity - and balance
Architecture
Source Routing Exploitation
Non-Discretionary Access Control
Security Domain
40. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Side Channel Attack
File Server
Cryptanalysis
Hijacking
41. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Cross-Site Scripting
Notification
Test Plan
Investigation
42. Effort/time needed to overcome a protective measure
Data Dictionary
Mobile Recovery
Call Tree
Work Factor
43. Unauthorized wireless network access device.
Replication
Rogue Access Points
Monitor
Disaster Recovery Plan
44. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
File Extension
Source Routing Exploitation
Simulation
SQL Injection
45. A control before attack
Business Continuity Program
Symmetric
Safeguard
Directive
46. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Mandatory Access Control (MAC)
Botnet
Private Branch Exchange (PBX)
Reciprocal Agreement
47. Momentary loss of power
Fault
Wireless Fidelity (Wi-Fi )
Fraggle
Mission-Critical Application
48. Pertaining to law - no omissions
Complete
Orange Book C Classification
Secondary Storage
Marking
49. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
TCSEC (Orange Book)
Recovery Time Objectives
Incident Response
Record Level Deletion
50. Physical description on the exterior of an object that communicates the existence of a label
Embedded Systems
Marking
Archival Data
Business Continuity Program