SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To create a copy of data as a precaution against the loss or damage of the original data.
Operational
Backup
Key Management
Log
2. Act of scrambling the cleartext message by using a key.
File
Encipher
Object
Object Oriented Programming (OOP)
3. Fault tolerance for power
Computer Forensics
Interference (Noise)
Generator
Deleted File
4. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Deterrent
Security Clearance
Business Records
Business Impact Analysis
5. OOP concept of a template that consist of attributes and behaviors
DR Or BC Coordinator
Keystroke Logging
Business Continuity Planning (BCP)
Class
6. The connection between a wireless and wired network.
Threads
Checksum
Access Point
Gateway
7. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Labeling
Marking
Elements of Negligence
Vital Record
8. Pertaining to law - high degree of veracity
Accurate
Mandatory Vacations
Convincing
Lattice
9. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Object Oriented Programming (OOP)
Boot (V.)
Tar Pits
CPU Cache
10. A failure of an IDS to detect an actual attack
False Negative
Polyalphabetic
Trademark
Masquerading
11. Total number of keys available that may be selected by the user of a cryptosystem
Key Space
Walk Though
Tort
Masquerading
12. The event signaling an IDS to produce an alarm when no attack has taken place
False Attack Stimulus
File Extension
Surge Suppressor
Mock Disaster
13. One of the key benefits of a network is the ability to share files stored on the server among several users.
Running
File Sharing
Shift Cipher (Caesar)
ISO/IEC 27001
14. Unsolicited commercial email
Radio Frequency Interference (RFI)
Incident Response Team
Concatenation
Spam
15. Small data files written to a user's hard drive by a web server.
Cookie
State Machine Model
Business Continuity Steering Committee
Preemptive
16. To start business continuity processes
Record Level Deletion
Activation
Recovery Point Objective (RPO)
Atomicity
17. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Disk Mirroring
Change Control
Memory Management
Fault Tolerance
18. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Control
Critical Functions
Simulation
Business Interruption Insurance
19. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
Chain Of Custody
True Attack Stimulus
Checklist Test (desk check)
Operational Exercise
20. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Teardrop
True Attack Stimulus
Accountability
BCP Testing Drills and Exercises
21. High frequency noise
Data Owner
TEMPEST
Electromagnetic Interference (EMI)
Buffer Overflow
22. Recovery alternative which outsources a business function at a cost
Watermarking
Service Bureau
Conflict Of Interest
Hearsay
23. The chance that something negative will occur
Triage
Total Risk
Layering
Risk
24. Pertaining to law - lending it self to one side of an argument
Convincing
Hearsay Evidence
Public Key Infrastructure (PKI)
Data Hiding
25. A layer 3 device that used to connect two or more network segments and regulate traffic.
Mirrored Site
Total Risk
Routers
File Level Deletion
26. Inappropriate data
Adware
Warm Site
Countermeasure
Malformed Input
27. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Business Continuity Program
Modification
Fire Classes
Discretionary Access Control (DAC)
28. To set the clearance of a subject or the classification of an object
Total Risk
Databases
Labeling
TCSEC (Orange Book)
29. The one person responsible for data - its classification and control setting
Journaling
Countermeasure
Data Custodian
Information Owner
30. Granular decision by a system of permitting or denying access to a particular resource on the system
CPU Cache
Detective
Authorization
Criminal Law
31. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Disaster Recovery Plan
Ethics
Bit
Simulation Test
32. Regular operations are stopped and where processing is moved to the alternate site.
Near Site
Site Policy
Mock Disaster
Full-Interruption test
33. High level - pertaining to planning
Honeypot
IP Fragmentation
Strategic
Journaling
34. A type of multitasking that allows for more even distribution of computing time among competing request
Message Digest
Remote Access Trojan
Ethics
Preemptive
35. A documented battle plan for coordinating response to incidents.
Virtual Memory
Isolation
Code
Incident Handling
36. System directed mediation of access with labels
Inheritance
Business Continuity Planning (BCP)
Mandatory
Trapdoors (Backdoors) (Maintenance Hooks)
37. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Brouter
Operational
Forward Recovery
Evidence
38. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Cryptography
Multi-Processor
Due Diligence
Full Test (Full Interruption)
39. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Electronic Vaulting
Mock Disaster
Eavesdropping
Residual Data
40. A state for operating system tasks only
Brownout
Supervisor Mode (monitor - system - privileged)
Initialization Vector
Workaround Procedures
41. Recovery alternative - short-term - high cost movable processing location
Mobile Site
User Mode (problem or program state)
Hacker
Kerckhoff's Principle
42. Mitigation of system or component loss or interruption through use of backup capability.
Hearsay Evidence
Object
Hearsay
Fault Tolerance
43. A program that waits for a condition or time to occur that executes an inappropriate activity
Proprietary
Salami
Double Blind Testing
Logic Bomb
44. Control type- that is communication based - typically written or oral
Administrative
Disk Mirroring
Degauss
Labeling
45. Mitigate damage by isolating compromised systems from the network.
Containment
Critical Infrastructure
Modems
Failure Modes and Effect Analysis (FEMA)
46. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Database Shadowing
Desk Check Test
Forward Recovery
Symmetric
47. Reduces causes of fire
Remote Journaling
Basics Of Secure Design
Data Custodian
Fire Prevention
48. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Integrated Test
Degauss
Hearsay Evidence
Coaxial Cable
49. Joining two pieces of text
Standalone Test
Containment
Concatenation
Business Impact Analysis
50. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Discretionary
File Shadowing
Directive
Mandatory Access Control (MAC)