SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Recovery Strategy
Byte
Education
Masked/Interruptible
2. A condition in which neither party is willing to stop their activity for the other to complete
Deadlock
Modems
Dangling Pointer
Procedure
3. The connection between a wireless and wired network.
Generator
Access Point
Warm Site
Orange Book B2 Classification
4. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Data Custodian
Standard
Deterrent
Pervasive Computing and Mobile Computing Devices
5. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Disk Mirroring
Fiber Optics
Trademark
Resumption
6. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Multilevel Security System
Multi-Programming
Fault
Proprietary
7. Amount of time for restoring a business process or function to normal operations without major loss
Business Continuity Steering Committee
Maximum Tolerable Downtime (MTD)
Structured Walk-Through Test
Residual Data
8. A process state - to be either be unable to run waiting for an external event or terminated
DR Or BC Coordinator
Isolation
Chain Of Custody
Stopped
9. Another subject cannot see an ongoing or pending update until it is complete
Isolation
Full Test (Full Interruption)
Metadata
ISO/IEC 27002
10. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Residual Risk
Cross Certification
Administrative Laws
Alternate Data Streams (File System Forks)
11. The core logic engine of an operating system which almost never changes
Mirrored Site
Compartmentalize
Kernel
Coaxial Cable
12. What is will remain - persistence
Encryption
Alarm Filtering
Durability
Content Dependent Access Control
13. A backup of data located where staff can gain access immediately
On-Site
Distributed Denial Of Service
Algorithm
Initialization Vector
14. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Residual Risk
Quantitative Risk Analysis
Alternate Data Streams (File System Forks)
Checklist Test (desk check)
15. All of the protection mechanism in a computer system
Investigation
Process Isolation
Risk
Trusted Computing Base
16. Unauthorized access of network devices.
Threats
Malformed Input
Physical Tampering
Firmware
17. An alert or alarm that is triggered when no actual attack has taken place
Risk
False (False Positive)
Top Secret
Plan Maintenance Procedures
18. Natural occurrence in circuits that are in close proximity
Recovery
Interference (Noise)
Log
Blind Testing
19. Someone who wants to cause harm
Conflict Of Interest
Attacker (Black hat - Hacker)
Picking
Multi-Tasking
20. Intellectual property protection for marketing efforts
DR Or BC Coordinator
Integrated Test
Trademark
Kerckhoff's Principle
21. Deals with discretionary protection
Digital Signature
Modification
Checklist Test
Orange Book C Classification
22. A temporary public file to inform others of a compromised digital certificate
Certificate Revocation List (CRL)
Disk Mirroring
Buffer Overflow
Key Management
23. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Message Digest
Containment
Centralized Access Control Technologies
Redundant Servers
24. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Mission-Critical Application
Disaster Recovery Plan
Pointer
25. OOP concept of an object at runtime
Identification
Instance
Keyed-Hashing For Message Authentication
Overlapping Fragment Attack
26. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Secondary Storage
File Extension
Containment
Tort
27. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Discretionary Access Control (DAC)
Waterfall
Walk Though
Virtual Memory
28. Converts source code to an executable
Capability Tables
Honeynet
Compiler
Side Channel Attack
29. To load the first piece of software that starts a computer.
Secondary Storage
Business Impact Assessment (BIA)
Brouter
Boot (V.)
30. Program that inappropriately collects private data or activity
Surveillance
Security Blueprint
Databases
Spyware
31. Mathematical function that determines the cryptographic operations
Job Rotation
Algorithm
Test Plan
Noise
32. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Business Interruption
Modems
Sharing
Teardrop
33. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
Disaster
SQL Injection
Shift Cipher (Caesar)
Integrated Test
34. Business and technical process of applying security software updates in a regulated periodic way
Patch Management
Mission-Critical Application
Prevention
Business Continuity Program
35. A copy of transaction data - designed for querying and reporting
Debriefing/Feedback
Data Warehouse
Pointer
Analysis
36. Of a system without prior knowledge by the tester or the tested
File Level Deletion
Double Blind Testing
Cipher Text
Mission-Critical Application
37. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Patch Panels
Bollard
Certification
Common Criteria
38. A layer 2 device that used to connect two network segments and regulate traffic.
Security Blueprint
JPEG (Joint Photographic Experts Group)
Qualitative
Bridge
39. Program instructions based upon the CPU's specific architecture
Sharing
Machine Language (Machine Code)
Certificate Revocation List (CRL)
Intrusion Detection Systems
40. Planning with a goal of returning to the normal business function
Information Technology Security Evaluation Criteria - ITSEC
Control Category
Restoration
Compression
41. Ertaining to a number system that has just two unique digits.
Forward Recovery
Blackout
Residual Risk
Binary
42. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Information Risk Management (IRM)
Ring Protection
Walk Though
Mobile Recovery
43. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Emergency
Checksum
Key Clustering
Remanence
44. A covert storage channel on the file attribute
Marking
Non-Discretionary Access Control
Alternate Data Streams (File System Forks)
Multilevel Security System
45. Most granular organization of controls
Control Category
Hot Spares
Simulation Test
Log
46. Unchecked data which spills into another location in memory
Buffer Overflow
State Machine Model
Event
Storage Area Network (SAN)
47. A hash that has been further encrypted with a symmetric algorithm
Monitor
Secondary Storage
Detective
Keyed-Hashing For Message Authentication
48. Recovery alternative - everything needed for the business function - except people and last backup
Containment
Hot Site
Activation
Compartmentalize
49. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
Data Custodian
TIFF (Tagged Image File Format)
Running Key
Multi-Processor
50. Written suggestions that direct choice to a few alternatives
Guidelines
Compiler
Payload
Business Impact Analysis