SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hitting a filed down key in a lock with a hammer to open without real key
Education
Bumping
Certificate Revocation List (CRL)
Steganography
2. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Concatenation
Recovery
Data Owner
Encryption
3. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Examples of non-technical security components
Embedded Systems
Compiler
Privacy Laws
4. Threats x Vulnerability x Asset Value = Total Risk
Contingency Plan
Source Routing Exploitation
Contact List
Total Risk
5. Location where coordination and execution of BCP or DRP is directed
Data Warehouse
EMI
Emergency Operations Center (EOC)
Business Recovery Timeline
6. An encryption method that has a key as long as the message
Running Key
Complete
Electromagnetic Interference (EMI)
Physical Tampering
7. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Risk Assessment / Analysis
Trapdoors (Backdoors) (Maintenance Hooks)
Disk Mirroring
Surveillance
8. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Identification
Lattice
The ACID Test
TCSEC (Orange Book)
9. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Denial Of Service
Alert
Access Control Lists
Microwave
10. A software design technique for abstraction of a process
Revocation
Data Hiding
IDS Intrusion Detection System
File Level Deletion
11. A passive network attack involving monitoring of traffic.
Dangling Pointer
Classification
Eavesdropping
Labeling
12. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Digital Signature
Declaration
TCSEC (Orange Book)
Replication
13. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Kerckhoff's Principle
Residual Data
False (False Positive)
Certificate Revocation List (CRL)
14. High frequency noise
Open Mail Relay Servers
Business Records
Electromagnetic Interference (EMI)
Trusted Computing Base
15. For PKI - to store another copy of a key
ISO/IEC 27001
Key Escrow
The ACID Test
Redundant Servers
16. An image compression standard for photographs
JPEG (Joint Photographic Experts Group)
Civil Law
Critical Infrastructure
Firewalls
17. Unsolicited advertising software
Activation
Job Rotation
Multilevel Security System
Adware
18. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Pervasive Computing and Mobile Computing Devices
Brute Force
Malformed Input
Civil Or Code Law
19. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Radio Frequency Interference (RFI)
Source Routing Exploitation
Trojan Horse
Business Continuity Program
20. Specific format of technical and physical controls that support the chosen framework and the architecture
Reference Monitor
Critical Records
Uninterruptible Power Supply (UPS)
Infrastructure
21. Someone who want to know how something works - typically by taking it apart
Hacker
Voice Over IP (VOIP)
Deletion
Denial Of Service
22. Effort/time needed to overcome a protective measure
MOM
Risk Mitigation
Work Factor
Multiplexers
23. Event(s) that cause harm
Incident
Shift Cipher (Caesar)
Denial Of Service
Botnet
24. Process of statistically testing a data set for the likelihood of relevant information.
Deterrent
Disaster
Message Digest
Sampling
25. Converts a high level language into machine language
Assembler
Distributed Denial Of Service
Non-Interference
Recovery Period
26. A type of multitasking that allows for more even distribution of computing time among competing request
Data Backups
Preemptive
Multi-Programming
Service Bureau
27. The technical and risk assesment of a system within the context of the operating environment
Criminal Law
Administrative Law
Certification
Open Mail Relay Servers
28. A planned or unplanned interruption in system availability.
System Downtime
Distributed Processing
Assembler
Job Training
29. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Security Blueprint
Forensic Copy
Coaxial Cable
Control Category
30. OOP concept of a class's details to be hidden from object
Fraggle
Disaster Recovery Tape
Encapsulation
Life Cycle of Evidence
31. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Certification Authority
Worldwide Interoperability for Microwave Access (WI-MAX )
Need-To-Know
TIFF (Tagged Image File Format)
32. High degree of visual control
Surveillance
Procedure
Modems
Collisions
33. Recovery alternative - a building only with sufficient power - and HVAC
Cold Site
TCSEC (Orange Book)
Education
Triage
34. Intellectual property protection for the expression of an idea
Vital Record
Copyright
Forensic Copy
ff Site
35. OOP concept of a distinct copy of the class
Side Channel Attack
Steganography
Object
False (False Positive)
36. Used to code/decode a digital data stream.
Codec
Embedded Systems
Byte Level Deletion
Examples of technical security components
37. A design methodology which addresses risk early and often
Spiral
Data Custodian
Slack Space
System Downtime
38. A programming device use in development to circumvent controls
Trapdoors (Backdoors) (Maintenance Hooks)
Modems
Picking
Wireless Fidelity (Wi-Fi )
39. Memory - RAM
Primary Storage
Residual Risk
Decipher
Operational Impact Analysis
40. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Protection
Governance
War Dialing
File Shadowing
41. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Primary Storage
Sequence Attacks
Encapsulation
Elements of Negligence
42. Provides a physical cross connect point for devices.
Disaster Recovery Plan
Watermarking
Patch Panels
Business Recovery Timeline
43. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Surge Suppressor
Process Isolation
Honeynet
Computer System Evidence
44. The first rating that requires security labels
Degauss
Orange Book B1 Classification
Analysis
Alert/Alarm
45. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Recovery Strategy
IP Fragmentation
Cross-Site Scripting
Threats
46. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Bit
The ACID Test
Sharing
Open Mail Relay Servers
47. To jump to a conclusion
Logic Bomb
Simulation Test
Inference
Fire Prevention
48. Recovery alternative - short-term - high cost movable processing location
Standalone Test
Key Escrow
Mobile Site
Trapdoors (Backdoors) (Maintenance Hooks)
49. People who interact with assets
Tort
Locard's Principle
User
Acronym for American Standard Code for Information Interchange (ASCII)
50. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Architecture
Vulnerability
Crisis
Deleted File