SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Near Site
EMI
Injection
Key Clustering
2. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Tapping
Multi-Programming
Orange Book A Classification
Gateway
3. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Data Hiding
Mock Disaster
Monitor
War Dialing
4. A computer designed for the purpose of studying adversaries
Accountability
Fire Prevention
JPEG (Joint Photographic Experts Group)
Honeypot
5. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
Need-To-Know
Intrusion Prevention Systems
Key Clustering
TIFF (Tagged Image File Format)
6. A process state - (blocked) needing input before continuing
Wait
Cipher Text
Private Branch Exchange (PBX)
Compression
7. Lower frequency noise
Disaster Recovery Plan
Radio Frequency Interference (RFI)
Deterrent
Buffer Overflow
8. May be responsible for overall recovery of an organization or unit(s).
DR Or BC Coordinator
Brute Force
Information Flow Model
Cookie
9. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Central Processing Unit (CPU)
Failure Modes and Effect Analysis (FEMA)
Class
Walk Though
10. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Keystroke Logging
Technical Access Controls
Substitution
Domain
11. Unauthorized access of network devices.
Executive Succession
Plaintext
Mobile Recovery
Physical Tampering
12. The one person responsible for data - its classification and control setting
Mirrored Site
The ACID Test
Information Owner
Archival Data
13. Disruption of operation of an electronic device due to a competing electromagnetic field.
Certification Authority
EMI
Pointer
Chain of Custody
14. RADIUS - TACACS+ - Diameter
Centralized Access Control Technologies
Modems
On-Site
Alternate Data Streams (File System Forks)
15. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Machine Language (Machine Code)
Accountability
Information Owner
Exercise
16. The managerial approval to operate a system based upon knowledge of risk to operate
Restoration
Time Of Check/Time Of Use
Strong Authentication
Accreditation
17. A type a computer memory that temporarily stores frequently used information for quick access.
Cache
Hacker
Information Risk Management (IRM)
Operating
18. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Malformed Input
Redundant Servers
Message Digest
Active Data
19. Objects or programming that looks the different but act same
Mock Disaster
Polymorphism
Mirroring
Trusted Computing Base
20. For PKI - to store another copy of a key
Key Escrow
Birthday Attack
Multi-Processor
Surge
21. Intellectual property protection for an confidential and critical process
Trade Secret
MOM
Incident Response
Layering
22. A collection of data or information that has a name
Hacker
ISO/IEC 27001
Computer System Evidence
File
23. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification
Database Shadowing
Information Owner
Bridge
24. A subnetwork with storage devices servicing all servers on the attached network.
Storage Area Network (SAN)
Access Control Attacks
Worldwide Interoperability for Microwave Access (WI-MAX )
Data Recovery
25. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Interference (Noise)
JPEG (Joint Photographic Experts Group)
User Mode (problem or program state)
26. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Cross-Site Scripting
E-Mail Spoofing
BCP Testing Drills and Exercises
Uninterruptible Power Supply (UPS)
27. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Cache
Notification
Structured Walk-Through Test
Fire Classes
28. Responsibility of a user for the actions taken by their account which requires unique identification
Bridge
Structured Walkthrough
Binary
Accountability
29. Memory management technique that allows two processes to run concurrently without interaction
Protection
Targeted Testing
Mantrap (Double Door System)
Chain Of Custody
30. A disturbance that degrades performance of electronic devices and electronic communications.
Radio Frequency Interference (RFI)
Privacy Laws
Firmware
Plain Text
31. Responsibility for actions
Hearsay
Compensating
Liability
CPU Cache
32. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Consistency
The ACID Test
Trade Secret
Contact List
33. A risk assessment method - intrinsic value
Qualitative
Orange Book C Classification
Classification
Discretionary Access Control (DAC)
34. Potential danger to information or systems
Need-To-Know
Codec
ISO/IEC 27001
Threats
35. A database backup type which records at the transaction level
Exercise
Fault
Remote Journaling
Polyalphabetic
36. To create a copy of data as a precaution against the loss or damage of the original data.
Electrostatic Discharge
File
Business Interruption Insurance
Backup
37. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
IP Address Spoofing
Site Policy Awareness
Failure Modes and Effect Analysis (FEMA)
Mandatory Access Control (MAC)
38. A telephone exchange for a specific office or business.
Private Branch Exchange (PBX)
Activation
Covert Channel
False Attack Stimulus
39. System mediation of access with the focus on the context of the request
Content Dependent Access Control
Cross Certification
Job Training
Business Interruption Insurance
40. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Due Diligence
Double Blind Testing
Business Continuity Steering Committee
Orange Book B2 Classification
41. Low level - pertaining to planning
Centralized Access Control Technologies
Adware
Tactical
Remote Journaling
42. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Common Law
Administrative Law
Tactical
ITSEC
43. Hardware or software that is part of a larger system
Collisions
Cache
Embedded
Non-Repudiation
44. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Process Isolation
Residual Data
War Dialing
Remote Access Trojan
45. Asymmetric encryption of a hash of message
Open Mail Relay Servers
Collisions
Work Factor
Digital Signature
46. Converts source code to an executable
Business Continuity Planning (BCP)
Critical Infrastructure
Compiler
Transients
47. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Administrative Access Controls
Notification
Hot Site
Elements of Negligence
48. OOP concept of a template that consist of attributes and behaviors
Fire Prevention
Forensic Copy
Class
Multi-Core
49. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Data Marts
Corrective
Surge Suppressor
Operating
50. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Processes are Isolated By
Inference
Interception
CobiT