SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OOP concept of a taking attributes from the original or parent
Inheritance
Operational
Residual Risk
Acronym for American Standard Code for Information Interchange (ASCII)
2. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Disaster Recovery Tape
Orange Book B1 Classification
Interception
Certification Authority
3. A planned or unplanned interruption in system availability.
System Downtime
Decipher
Voice Over IP (VOIP)
Durability
4. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Emergency
Certificate Revocation List (CRL)
Cache
Kerckhoff's Principle
5. A electronic attestation of identity by a certificate authority
SQL Injection
Inference
Digital Certificate
Information Technology Security Evaluation Criteria - ITSEC
6. A mathematical tool for verifying no unintentional changes have been made
Checksum
Hard Disk
Inrush Current
Technical Access Controls
7. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Cipher Text
Alarm Filtering
Cryptology
Primary Storage
8. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Satellite
Orange Book C2 Classification
Integrated Test
Access Point
9. A trusted issuer of digital certificates
Work Factor
Voice Over IP (VOIP)
Test Plan
Certification Authority
10. Trading one for another
Reciprocal Agreement
Governance
Substitution
Kernel
11. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Byte Level Deletion
Data Warehouse
Injection
Electromagnetic Interference (EMI)
12. Converts a high level language into machine language
Assembler
Stopped
Cold Site
Operational Impact Analysis
13. Mediation of subject and object interactions
Deletion
Data Dictionary
Access Control
Interference (Noise)
14. System directed mediation of access with labels
Buffer Overflow
Need-To-Know
Mandatory
TIFF (Tagged Image File Format)
15. Mathematical function that determines the cryptographic operations
Firmware
Distributed Processing
Recovery
Algorithm
16. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Backup
SQL Injection
Transfer
Walk Though
17. To reduce sudden rises in current
Maximum Tolerable Downtime (MTD)
Trademark
Plaintext
Surge Suppressor
18. A risk assessment method - intrinsic value
Replication
Plaintext
Steganography
Qualitative
19. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
Certificate Revocation List (CRL)
MOM
Class
Machine Language (Machine Code)
20. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Detective
Business Continuity Program
Adware
Authentication
21. Memory management technique which allows subjects to use the same resource
Hard Disk
Sharing
Byte
Control
22. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Detective
Due Care
Business Continuity Steering Committee
Corrective
23. Intellectual property protection for an confidential and critical process
Double Blind Testing
Trade Secret
Business Impact Analysis
Remote Access Trojan
24. Two certificate authorities that trust each other
Exposure
Metadata
Interception
Cross Certification
25. Location to perform the business function
Alternate Site
JPEG (Joint Photographic Experts Group)
Trojan Horse
Technical Access Controls
26. Unsolicited commercial email
Spam
Memory Management
Disaster Recovery Plan
Confidence Value
27. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. A condition in which neither party is willing to stop their activity for the other to complete
Security Kernel
Deadlock
Elements of Negligence
Spam
29. Organized group of compromised computers
Site Policy Awareness
Checklist Test (desk check)
Service Bureau
Botnet
30. A type of multitasking that allows for more even distribution of computing time among competing request
Preemptive
Record Level Deletion
Criminal Law
Orange Book C2 Classification
31. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Firewalls
Safeguard
Trade Secret
Confidence Value
32. Business and technical process of applying security software updates in a regulated periodic way
IDS Intrusion Detection System
Asymmetric
Patch Management
TIFF (Tagged Image File Format)
33. Subject based description of a system or a collection of resources
Eavesdropping
Identification
Acronym for American Standard Code for Information Interchange (ASCII)
Capability Tables
34. A backup type - for databases at a point in time
Shadowing (file shadowing)
Compensating
Masked/Interruptible
Alarm Filtering
35. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Birthday Attack
Bit
Procedure
Substitution
36. OOP concept of a template that consist of attributes and behaviors
Routers
Open Mail Relay Servers
Class
Strategic
37. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Reference Monitor
Identification
Operating
Phishing
38. Process of statistically testing a data set for the likelihood of relevant information.
Sampling
Exposure
Fault Tolerance
Key Escrow
39. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Civil Law
Kerberos
TEMPEST
Highly Confidential
40. An availability attack - to consume resources to the point of exhaustion
Transfer
Switches
Contact List
Denial Of Service
41. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Simulation
Distributed Processing
Checklist Test (desk check)
Territoriality
42. A layer 3 device that used to connect two or more network segments and regulate traffic.
Active Data
Routers
Worm
Access Control Attacks
43. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Marking
Recovery
Event
Incident Response
44. A state where two subjects can access the same object without proper mediation
Orange Book B1 Classification
Ring Protection
Event
Race Condition
45. A test conducted on one or more components of a plan under actual operating conditions.
Operational Test
JPEG (Joint Photographic Experts Group)
Worm
Computer System Evidence
46. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Multilevel Security System
Residual Risk
Full-Interruption test
47. To create a copy of data as a precaution against the loss or damage of the original data.
Job Training
Recovery
Backup
JPEG (Joint Photographic Experts Group)
48. Vehicle or tool that exploits a weakness
Embedded
Isolation
Convincing
Threats
49. People who interact with assets
Brouter
User
Confidence Value
Resumption
50. Final purpose or result
Discretionary
Spam
False (False Positive)
Payload