SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. More than one CPU on a single board
Guidelines
Multi-Core
Event
Fire Suppression
2. Moving letters around
Data Leakage
Electronic Vaulting
Declaration
Permutation /Transposition
3. Natural occurrence in circuits that are in close proximity
Interpreter
Capability Tables
Interference (Noise)
False Negative
4. A computer designed for the purpose of studying adversaries
Change Control
Orange Book B1 Classification
Hot Site
Honeypot
5. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Honeypot
ISO/IEC 27001
Fiber Optics
Information Risk Management (IRM)
6. A programming design concept which abstracts one set of functions from another in a serialized fashion
Pervasive Computing and Mobile Computing Devices
Layering
Checkpoint
Process Isolation
7. Recovery alternative - a building only with sufficient power - and HVAC
Countermeasure
Cold Site
Isolation
Enticement
8. Pertaining to law - lending it self to one side of an argument
Site Policy
Convincing
Radio Frequency Interference (RFI)
Remote Journaling
9. Vehicle or tool that exploits a weakness
Procedure
Polyalphabetic
Threats
Cryptology
10. Induces a crime - tricks a person - and is illegal
Operational Test
Gateway
Radio Frequency Interference (RFI)
Entrapment
11. Outputs within a given function are the same result
Collisions
Smurf
Cryptology
Framework
12. Mediation of subject and object interactions
Framework
Liability
Access Control
Exposure
13. One entity with two competing allegiances
Trade Secret
Conflict Of Interest
Satellite
Remote Access Trojan
14. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Smurf
Disk Mirroring
Information Risk Management (IRM)
Ring Protection
15. Statistical probabilities of a collision are more likely than one thinks
Procedure
Birthday Attack
Architecture
Proxies
16. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Running
Sequence Attacks
Data Backup Strategies
Transients
17. Uncleared buffers or media
Switches
Object Reuse
Encryption
Disaster
18. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Top Secret
Contingency Plan
Satellite
Supervisor Mode (monitor - system - privileged)
19. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Policy
Burn
Hearsay
SQL Injection
20. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Checksum
Data Recovery
Certification Authority
Non-Repudiation
21. Short period of low voltage.
Non-Repudiation
Sag/Dip
Mixed Law System
Durability
22. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Walk Though
Declaration
Exercise
Journaling
23. Recovery alternative which includes cold site and some equipment and infrastructure is available
Incident Response Team
Warm Site
Recovery Time Objectives
Orange Book A Classification
24. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Class
Access Control Lists
Computer System Evidence
Supervisor Mode (monitor - system - privileged)
25. A condition in which neither party is willing to stop their activity for the other to complete
Event
Noise
Deadlock
Redundant Servers
26. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Emergency Operations Center (EOC)
E-Mail Spoofing
Privacy Laws
Full Test (Full Interruption)
27. Pertaining to law - accepted by a court
Admissible
Certificate Revocation List (CRL)
BCP Testing Drills and Exercises
Embedded
28. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
E-Mail Spoofing
Salami
Chain Of Custody
Data Owner
29. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Pervasive Computing and Mobile Computing Devices
Metadata
Alert
Accurate
30. A system that enforces an access control policy between two networks.
Alarm Filtering
Capability Tables
Firewalls
Fault
31. A documented battle plan for coordinating response to incidents.
User
Byte
Incident Handling
Hash Function
32. A state where two subjects can access the same object without proper mediation
Corrective
Business Impact Analysis
Discretionary Access Control (DAC)
Race Condition
33. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. A state for operating system tasks only
Supervisor Mode (monitor - system - privileged)
Fragmented Data
Orange Book C2 Classification
Confidence Value
35. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
ff Site
Alternate Site
Data Leakage
File Extension
36. Someone who want to know how something works - typically by taking it apart
Injection
Plaintext
Hacker
Orange Book D Classification
37. Uncheck data input which results in redirection
Life Cycle of Evidence
On-Site
Eavesdropping
HTTP Response Splitting
38. Encryption system using shared key/private key/single key/secret key
Symmetric
Accurate
Reference Monitor
Business Interruption
39. Unsolicited commercial email
Framework
Spam
Orange Book C Classification
Generator
40. Moving the alphabet intact a certain number spaces
Substitution
Shift Cipher (Caesar)
Architecture
Intrusion Prevention Systems
41. Line noise that is superimposed on the supply circuit.
Transients
Relocation
Surveillance
Mantrap (Double Door System)
42. Fault tolerance for power
Generator
Running
Domain
Interpreter
43. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Bollard
Dangling Pointer
Radio Frequency Interference (RFI)
Proxies
44. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Basics Of Secure Design
Business Interruption Insurance
Residual Risk
Risk Assessment / Analysis
45. To smooth out reductions or increases in power
Alert
Object Oriented Programming (OOP)
Need-To-Know
UPS
46. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Data Custodian
Safeguard
Change Control
Electronic Vaulting
47. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Uninterruptible Power Supply (UPS)
Running Key
Directive
Test Plan
48. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Inference
Degauss
Alternate Data Streams (File System Forks)
Key Management
49. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Strong Authentication
Mission-Critical Application
Forward Recovery
Simulation
50. Recovery alternative which outsources a business function at a cost
Service Bureau
High-Risk Areas
Site Policy Awareness
Open Mail Relay Servers