SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recording the Who What When Where How of evidence
Chain Of Custody
Redundant Array Of Independent Drives (RAID)
Risk Mitigation
Primary Storage
2. Unsolicited advertising software
TCSEC (Orange Book)
Debriefing/Feedback
Job Rotation
Adware
3. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Honeypot
Sniffing
Operational Impact Analysis
Vital Record
4. The level and label given to an individual for the purpose of compartmentalization
Ring Protection
Security Clearance
Kernel
Civil Or Code Law
5. Maximum tolerance for loss of certain business function - basis of strategy
Recovery Time Objectives
Forward Recovery
Shift Cipher (Caesar)
Integrated Test
6. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Life Cycle of Evidence
Business Recovery Team
Business Unit Recovery
Worldwide Interoperability for Microwave Access (WI-MAX )
7. Hiding the fact that communication has occurred
Entrapment
Steganography
Recovery Period
Masked/Interruptible
8. Evaluation of a system without prior knowledge by the tester
Modems
Intrusion Prevention Systems
Blind Testing
File
9. A mathematical tool for verifying no unintentional changes have been made
Disaster Recovery Plan
Checksum
Process Isolation
Declaration
10. Joining two pieces of text
Watermarking
Residual Data
Concatenation
Risk
11. Highest level of authority at EOC with knowledge of the business process and the resources available
Walk Though
Incident Manager
Eavesdropping
Near Site
12. An asymmetric cryptography mechanism that provides authentication.
Sequence Attacks
Life Cycle of Evidence
Slack Space
Digital Signature
13. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Waterfall
Surveillance
Analysis
Mobile Site
14. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Slack Space
Exposure
Patent
Top Secret
15. Lower frequency noise
Keystroke Logging
Governance
Radio Frequency Interference (RFI)
Containment
16. Subject based description of a system or a collection of resources
Capability Tables
Authentication
Business Recovery Timeline
Classification Scheme
17. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Bumping
Reference Monitor
Marking
Trojan Horse
18. Written internalized or nationalized norms that are internal to an organization
Code
Standard
Business Unit Recovery
EMI
19. A temporary public file to inform others of a compromised digital certificate
Certificate Revocation List (CRL)
Initialization Vector
Cryptology
Detection
20. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Burn
Incident Response Team
Interception
Alert/Alarm
21. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
File Server
False Attack Stimulus
Business Interruption
State Machine Model
22. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Confidence Value
Access Control Lists
Data Dictionary
Information Flow Model
23. Uncheck data input which results in redirection
Tapping
HTTP Response Splitting
Operational Test
Secondary Storage
24. More than one process in the middle of executing at a time
Business Impact Assessment (BIA)
Multi-Tasking
Keystroke Logging
Backup
25. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Exercise
Evidence
Public Key Infrastructure (PKI)
Conflict Of Interest
26. A design methodology which addresses risk early and often
Data Recovery
Recovery Time Objectives
Spiral
Civil Or Code Law
27. A device that converts between digital and analog representation of data.
Moore's Law
Race Condition
Modems
Structured Walk-Through Test
28. Used to code/decode a digital data stream.
Codec
Debriefing/Feedback
Memory Management
TEMPEST
29. Reprogrammable basic startup instructions
Wireless Fidelity (Wi-Fi )
Structured Walkthrough
Firmware
Shielding
30. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
BCP Testing Drills and Exercises
Emergency Procedures
Smurf
Orange Book C2 Classification
31. Recovery alternative which outsources a business function at a cost
Business Interruption
Service Bureau
True Attack Stimulus
Authentication
32. System of law based upon what is good for society
Double Blind Testing
Forward Recovery
Separation Of Duties
Civil Or Code Law
33. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Key Space
Life Cycle of Evidence
Governance
Deadlock
34. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification
Assembler
Prevention
Mock Disaster
35. A legal enforceable agreement between: two people - two organizations - a person and an organization.
IP Address Spoofing
Electronic Vaulting
Framework
Tort
36. One entity with two competing allegiances
Cold Site
Risk
Conflict Of Interest
Codec
37. Amount of time for restoring a business process or function to normal operations without major loss
Incident Response Team
Cryptography
Maximum Tolerable Downtime (MTD)
On-Site
38. Encryption system using shared key/private key/single key/secret key
Symmetric
Malformed Input
Steganography
Tort
39. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Authentic
IP Address Spoofing
Overlapping Fragment Attack
Emergency Procedures
40. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Tort
Recovery Point Objective (RPO)
Hot Site
Operational Test
41. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Encipher
Business Unit Recovery
Blind Testing
Full Test (Full Interruption)
42. For PKI - to have more than one person in charge of a sensitive function
Multi-Party Control
Machine Language (Machine Code)
Non-Interference
Analysis
43. May be responsible for overall recovery of an organization or unit(s).
Fiber Optics
Pointer
DR Or BC Coordinator
Threads
44. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Preemptive
Elements of Negligence
Legacy Data
Ring Protection
45. To move from location to location - keeping the same function
Compartmentalize
Kerckhoff's Principle
Job Rotation
Control Type
46. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Risk Mitigation
Cross Certification
Slack Space
Acronym for American Standard Code for Information Interchange (ASCII)
47. More than one processor sharing same memory - also know as parallel systems
Denial Of Service
UPS
Data Integrity
Multi-Processor
48. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Change Control
Machine Language (Machine Code)
Locard's Principle
Civil Law
49. Pertaining to law - no omissions
Accountability
Patch Management
Complete
Blind Testing
50. Evidence must be: admissible - authentic - complete - accurate - and convincing
Intrusion Prevention Systems
File Sharing
Mantrap (Double Door System)
5 Rules Of Evidence