SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The first rating that requires security labels
Orange Book B1 Classification
Checklist Test (desk check)
Inrush Current
Concentrator
2. A process state - (blocked) needing input before continuing
Disk Mirroring
Forward Recovery
MOM
Wait
3. Weak evidence
Storage Area Network (SAN)
Hearsay
Surveillance
Emergency Operations Center (EOC)
4. Responsibility for actions
Surge Suppressor
Liability
Symmetric
TNI (Red Book)
5. To stop damage from spreading
Job Training
Uninterruptible Power Supply (UPS)
EMI
Containment
6. A process state - to be either be unable to run waiting for an external event or terminated
Byte Level Deletion
Incident Response Team
Stopped
TCSEC (Orange Book)
7. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Databases
Residual Data
Forward Recovery
Disk Mirroring
8. Location to perform the business function
Civil Or Code Law
HTTP Response Splitting
Alternate Site
Brute Force
9. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Administrative Access Controls
CobiT
Shielding
E-Mail Spoofing
10. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Radio Frequency Interference (RFI)
Security Clearance
Bit
DR Or BC Coordinator
11. Employment education done once per position or at significant change of function
Intrusion Prevention Systems
Job Training
Radio Frequency Interference (RFI)
Operational Exercise
12. A running key using a random key that is never used again
Due Diligence
Triage
Memory Management
One Time Pad
13. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
Warm Site
SQL Injection
Forensic Copy
Kernel
14. Control category- to record an adversary's actions
Code
Cross Certification
Detective
Forward Recovery
15. More than one process in the middle of executing at a time
Administrative Laws
Multi-Tasking
Qualitative
Byte Level Deletion
16. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Business Impact Analysis
Slack Space
File Server
Inheritance
17. Review of data
Application Programming Interface
Distributed Denial Of Service
Recovery Strategy
Analysis
18. A electronic attestation of identity by a certificate authority
Substitution
Orange Book C Classification
Code
Digital Certificate
19. A system designed to prevent unauthorized access to or from a private network.
Risk
Analysis
Firewall
Phishing
20. Pertaining to law - lending it self to one side of an argument
Due Diligence
Recovery Point Objective (RPO)
Convincing
Triage
21. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Log
Total Risk
Replication
Business Unit Recovery
22. What is will remain - persistence
Durability
Access Control Matrix
ISO/IEC 27002
Relocation
23. The study of cryptography and cryptanalysis
Incident Response Team
Acronym for American Standard Code for Information Interchange (ASCII)
Cryptology
Smurf
24. Vehicle stopping object
Key Management
Bollard
Entrapment
Framework
25. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Smurf
Hot Spares
Primary Storage
Race Condition
26. A Trojan horse with the express underlying purpose of controlling host from a distance
Proxies
Analysis
Civil Law
Remote Access Trojan
27. Encryption system using a pair of mathematically related unequal keys
Fire Detection
Asymmetric
IP Fragmentation
Highly Confidential
28. The connection between a wireless and wired network.
Aggregation
Cryptovariable
Access Point
Transfer
29. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Chain of Custody
Administrative Law
False Attack Stimulus
Internal Use Only
30. Moving the alphabet intact a certain number spaces
Shift Cipher (Caesar)
Encapsulation
Business Records
Copyright
31. Recording the Who What When Where How of evidence
Chain Of Custody
Hot Spares
War Dialing
Method
32. The collection and summation of risk data relating to a particular asset and controls for that asset
Data Recovery
Risk Assessment
Concentrator
Business Recovery Team
33. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Dictionary Attack
Faraday Cage/ Shield
Restoration
Uninterruptible Power Supply (UPS)
34. Methodical research of an incident with the purpose of finding the root cause
Job Training
Investigation
Coaxial Cable
Restoration
35. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.
Tort
Transfer
Supervisor Mode (monitor - system - privileged)
Risk Mitigation
36. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Active Data
Notification
Mandatory Access Control (MAC)
Evidence
37. Descrambling the encrypted message with the corresponding key
Decipher
Time Of Check/Time Of Use
Orange Book C2 Classification
Framework
38. Initial surge of current
Admissible
Inrush Current
Spyware
Encipher
39. Moving letters around
Embedded Systems
Multi-Core
On-Site
Permutation /Transposition
40. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Mission-Critical Application
Multiplexers
Keystroke Logging
ITSEC
41. DoS - Spoofing - dictionary - brute force - wardialing
Access Control Attacks
Job Rotation
Dangling Pointer
Hacker
42. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
System Life Cycle
Data Dictionary
Blackout
Data Owner
43. Physical description on the exterior of an object that communicates the existence of a label
Rootkit
Marking
Substitution
Call Tree
44. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Directive
Bumping
Firewalls
Masked/Interruptible
45. To load the first piece of software that starts a computer.
Gateway
Boot (V.)
Work Factor
Stopped
46. Requirement of access to data for a clearly defined purpose
Need-To-Know
Trojan Horse
Risk Mitigation
Smurf
47. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Residual Risk
Mandatory Access Control (MAC)
JPEG (Joint Photographic Experts Group)
Desk Check Test
48. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
TNI (Red Book)
Shift Cipher (Caesar)
Slack Space
Forward Recovery
49. State of computer - to be running a process
Operational Test
Operating
Object Reuse
Supervisor Mode (monitor - system - privileged)
50. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Electronic Vaulting
Convincing
Resumption
Framework