SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A passive network attack involving monitoring of traffic.
Eavesdropping
Virus
Accurate
Radio Frequency Interference (RFI)
2. An encryption method that has a key as long as the message
Object Oriented Programming (OOP)
Running Key
Safeguard
Administrative Law
3. The core logic engine of an operating system which almost never changes
ff Site
Architecture
Acronym for American Standard Code for Information Interchange (ASCII)
Kernel
4. RADIUS - TACACS+ - Diameter
Preemptive
Notification
Centralized Access Control Technologies
Open Mail Relay Servers
5. Code making
Cryptography
Containment
Metadata
Fragmented Data
6. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Cryptovariable
Log
Change Control
Redundant Servers
7. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Radio Frequency Interference (RFI)
Civil Law
Critical Records
Encapsulation
8. Object reuse protection and auditing
Orange Book C2 Classification
Disaster Recovery Teams (Business Recovery Teams)
Vulnerability
Information Risk Management (IRM)
9. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Business Recovery Team
Tar Pits
Running Key
Remote Access Trojan
10. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Hard Disk
CobiT
Full Test (Full Interruption)
File Shadowing
11. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Mixed Law System
Isolation
Sniffing
Smurf
12. May be responsible for overall recovery of an organization or unit(s).
Dictionary Attack
System Downtime
DR Or BC Coordinator
Detection
13. A group or network of honeypots
Brouter
Memory Management
Honeynet
Digital Certificate
14. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
TIFF (Tagged Image File Format)
Need-To-Know
True Attack Stimulus
Disaster
15. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Threats
Worm
Risk Assessment
Mirroring
16. Potentially compromising leakage of electrical or acoustical signals.
Emanations
Redundant Array Of Independent Drives (RAID)
Business Unit Recovery
Shadowing (file shadowing)
17. A condition in which neither party is willing to stop their activity for the other to complete
Compartmentalize
Watermarking
Shift Cipher (Caesar)
Deadlock
18. Mitigate damage by isolating compromised systems from the network.
Multi-Tasking
Covert Channel
Containment
Atomicity
19. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Bit
Operational Impact Analysis
Business Recovery Timeline
Chain of Custody
21. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Distributed Processing
Burn
Orange Book A Classification
Firewalls
22. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Hijacking
Buffer Overflow
Distributed Denial Of Service
Business Interruption Insurance
23. Recovery alternative - short-term - high cost movable processing location
Spyware
Bollard
Mobile Site
Detection
24. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Chain of Custody
Prevention
Byte Level Deletion
Disk Mirroring
25. Another subject cannot see an ongoing or pending update until it is complete
Patch Management
Isolation
Reciprocal Agreement
Analysis
26. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Business Recovery Timeline
Resumption
Virtual Memory
Hard Disk
27. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Information Technology Security Evaluation Criteria - ITSEC
Workaround Procedures
Multiplexers
On-Site
28. All of the protection mechanism in a computer system
Workaround Procedures
Mandatory Vacations
Data Marts
Trusted Computing Base
29. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Walk Though
Firewalls
Remote Access Trojan
Incident Response
30. A physical enclosure for verifying identity before entry to a facility
Interpreter
Mantrap (Double Door System)
Metadata
Highly Confidential
31. Location where coordination and execution of BCP or DRP is directed
Computer Forensics
Class
Key Clustering
Emergency Operations Center (EOC)
32. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Overlapping Fragment Attack
Plain Text
JPEG (Joint Photographic Experts Group)
Remote Access Trojan
33. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Threads
Cryptology
Hot Spares
Mixed Law System
34. Deals with discretionary protection
High-Risk Areas
Orange Book C Classification
Supervisor Mode (monitor - system - privileged)
Business Impact Analysis
35. OOP concept of a class's details to be hidden from object
Incident Response Team
Atomicity
Multi-Core
Encapsulation
36. Memory - RAM
Private Branch Exchange (PBX)
Orange Book D Classification
Microwave
Primary Storage
37. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Emergency
Non-Discretionary Access Control
Orange Book D Classification
Orange Book C Classification
38. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Debriefing/Feedback
The ACID Test
On-Site
Orange Book B2 Classification
39. An asymmetric cryptography mechanism that provides authentication.
Cipher Text
Control Type
Digital Signature
Incident
40. One way encryption
Packet Filtering
Radio Frequency Interference (RFI)
Hash Function
Qualitative
41. Wrong against society
Decipher
Digital Certificate
Criminal Law
Mandatory Vacations
42. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. A device that converts between digital and analog representation of data.
Critical Infrastructure
Modems
File Extension
Deletion
44. Return to a normal state
Rootkit
Trade Secret
Embedded Systems
Recovery
45. Line noise that is superimposed on the supply circuit.
Tracking
Routers
Transients
Directive
46. Regular operations are stopped and where processing is moved to the alternate site.
Firewalls
Database Shadowing
Full-Interruption test
Spyware
47. Mediation of covert channels must be addressed
Information Flow Model
Encryption
Moore's Law
Object
48. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Near Site
Data Recovery
Isolation
Processes are Isolated By
49. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Archival Data
Encipher
Critical Functions
Pervasive Computing and Mobile Computing Devices
50. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Strategic
Orange Book D Classification
HTTP Response Splitting
Durability