SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Plaintext
Event
Policy
Voice Over IP (VOIP)
2. A physical enclosure for verifying identity before entry to a facility
Tar Pits
Binary
Mantrap (Double Door System)
Orange Book D Classification
3. A collection of information designed to reduce duplication and increase integrity
Business Records
Databases
Remote Journaling
Job Training
4. Employment education done once per position or at significant change of function
User Mode (problem or program state)
Job Training
Critical Records
Brouter
5. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Shielding
Kerckhoff's Principle
Orange Book D Classification
Blind Testing
6. Two different keys decrypt the same cipher text
Key Clustering
Restoration
Sniffing
Covert Channel
7. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Security Clearance
Failure Modes and Effect Analysis (FEMA)
Checklist Test (desk check)
Encapsulation
8. System of law based upon what is good for society
Routers
Civil Or Code Law
TNI (Red Book)
Electrostatic Discharge
9. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Incident Response Team
Threat Agent
Simulation Test
Data Recovery
10. A device that converts between digital and analog representation of data.
Log
Modems
Patch Management
False Attack Stimulus
11. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
File Shadowing
Damage Assessment
Digital Signature
Trade Secret
12. Two certificate authorities that trust each other
Key Escrow
Cross Certification
Cryptanalysis
Radio Frequency Interference (RFI)
13. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Internal Use Only
Disk Mirroring
Information Flow Model
Encipher
14. Third party processes used to organize the implementation of an architecture
File Shadowing
Framework
Patch Panels
Critical Records
15. To stop damage from spreading
Containment
Injection
Evidence
Life Cycle of Evidence
16. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Brownout
Emergency Procedures
Kernel
Bumping
17. For PKI - to store another copy of a key
Operational Exercise
Cross Training
Key Escrow
Locard's Principle
18. Scrambled form of the message or data
Business Continuity Program
Cipher Text
Territoriality
Critical Functions
19. Unauthorized access of network devices.
Malformed Input
Infrastructure
IDS Intrusion Detection System
Physical Tampering
20. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Confidence Value
Key Clustering
Disaster Recovery Plan
Computer System Evidence
21. A basic level of network access control that is based upon information contained in the IP packet header.
Contingency Plan
Packet Filtering
Inrush Current
TCSEC (Orange Book)
22. A process state - to be executing a process on the CPU
Plain Text
Reference Monitor
Running
DR Or BC Coordinator
23. Induces a crime - tricks a person - and is illegal
Mitigate
Masquerading
Entrapment
Modification
24. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Discretionary
Business Interruption
Brownout
Secondary Storage
25. Converts a high level language into machine language
Hijacking
Assembler
Voice Over IP (VOIP)
Security Clearance
26. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Disaster
Data Hiding
Non-Discretionary Access Control
Cryptology
27. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Multi-Programming
Physical Tampering
Trademark
Packet Filtering
28. More than one processor sharing same memory - also know as parallel systems
Multi-Processor
ff Site
Reciprocal Agreement
Central Processing Unit (CPU)
29. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Spam
Virus
True Attack Stimulus
Non-Discretionary Access Control
30. Amount of time for restoring a business process or function to normal operations without major loss
User Mode (problem or program state)
Maximum Tolerable Downtime (MTD)
Source Routing Exploitation
Kerberos
31. Wrong against society
Mandatory
Shift Cipher (Caesar)
Criminal Law
Exercise
32. Power surge
Activation
Electrostatic Discharge
Cross Training
Code
33. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Strong Authentication
ff Site
Elements of Negligence
Surge Suppressor
34. Organized group of compromised computers
Botnet
Reciprocal Agreement
Access Point
Compartmentalize
35. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Total Risk
Walk Though
Data Owner
Multilevel Security System
36. Someone who want to know how something works - typically by taking it apart
Hacker
Adware
Stopped
Cache
37. Uncleared buffers or media
Change Control
Operating
Object Reuse
Process Isolation
38. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Standalone Test
Consistency
Remote Journaling
Simulation
39. Regular operations are stopped and where processing is moved to the alternate site.
Full-Interruption test
Concentrator
Directive
UPS
40. Potential danger to information or systems
Fault Tolerance
Threats
Common Criteria
Wait
41. Business and technical process of applying security software updates in a regulated periodic way
Incident
Tracking
Standalone Test
Patch Management
42. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Wireless Fidelity (Wi-Fi )
Hot Site
Highly Confidential
Trojan Horse
43. Code breaking - practice of defeating the protective properties of cryptography.
Cryptanalysis
Orange Book D Classification
Due Care
Authentication
44. To set the clearance of a subject or the classification of an object
Accreditation
Security Clearance
Restoration
Labeling
45. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Wait
Basics Of Secure Design
Trademark
Packet Filtering
46. Effort/time needed to overcome a protective measure
Class
Information Flow Model
Work Factor
Forward Recovery
47. Pertaining to law - verified as real
Convincing
Prevention
Authentic
Access Point
48. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Damage Assessment
Multi-Core
Residual Data
Packet Filtering
49. Representatives from each functional area or department get together and walk through the plan from beginning to end.
CobiT
Structured Walk-Through Test
Alternate Site
Burn
50. More than one process in the middle of executing at a time
Rollback
Mission-Critical Application
ISO/IEC 27002
Multi-Tasking