SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recovery alternative which includes cold site and some equipment and infrastructure is available
Certification
Malformed Input
Warm Site
Covert Channel
2. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Discretionary Access Control (DAC)
Teardrop
Emergency Operations Center (EOC)
Instance
3. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Mission-Critical Application
Decipher
Trademark
Plain Text
4. Policy or stated actions
Due Care
Digital Certificate
Monitor
Mirrored Site
5. A failure of an IDS to detect an actual attack
False Negative
Multi-Party Control
Need-To-Know
Recovery Strategy
6. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Multi-Core
Network Attached Storage (NAS)
Chain Of Custody
Embedded Systems
7. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Mandatory Access Control (MAC)
Incident Response
Exposure
Generator
8. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Aggregation
Analysis
Tort
Critical Infrastructure
9. Controls for termination of attempt to access object
Dangling Pointer
Site Policy
Intrusion Prevention Systems
Transfer
10. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Watermarking
Multi-Processor
Failure Modes and Effect Analysis (FEMA)
Concatenation
11. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Alternate Site
Faraday Cage/ Shield
Watermarking
Disaster Recovery Tape
12. Evidence must be: admissible - authentic - complete - accurate - and convincing
Call Tree
Embedded Systems
5 Rules Of Evidence
Countermeasure
13. Using small special tools all tumblers of the lock are aligned - opening the door
Shift Cipher (Caesar)
Sharing
Picking
Liability
14. Inappropriate data
Full Test (Full Interruption)
Critical Infrastructure
Malformed Input
Database Replication
15. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Polymorphism
Interception
Byte
Firewalls
16. Weak evidence
Tar Pits
Hearsay
Trojan Horse
Fire Detection
17. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Business Records
Trapdoors (Backdoors) (Maintenance Hooks)
Civil Law
Recovery
18. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Proprietary
Bumping
Decipher
Chain of Custody
19. Malware that makes many small changes over time to a single data point or system
Interception
Rootkit
Salami
Elements of Negligence
20. A protocol for the efficient transmission of voice over the Internet
Byte
Voice Over IP (VOIP)
Ring Protection
Digital Signature
21. A test conducted on one or more components of a plan under actual operating conditions.
Record Level Deletion
Operational Test
Risk
Analysis
22. More than one process in the middle of executing at a time
Multi-Tasking
Business Continuity Steering Committee
Change Control
Compression
23. Short period of low voltage.
Declaration
Watermarking
Sag/Dip
Examples of technical security components
24. A technology that reduces the size of a file.
Slack Space
E-Mail Spoofing
Compression
Incident
25. Tool which mediates access
Object
Control
Business Continuity Steering Committee
Restoration
26. An administrative unit or a group of objects and subjects controlled by one reference monitor
Security Domain
Highly Confidential
Application Programming Interface
Eavesdropping
27. The study of cryptography and cryptanalysis
Tapping
Disaster Recovery Plan
Cryptology
Access Control
28. A system that enforces an access control policy between two networks.
Internal Use Only
DR Or BC Coordinator
Mitigate
Firewalls
29. High degree of visual control
Surveillance
Digital Signature
Double Blind Testing
DR Or BC Coordinator
30. A running key using a random key that is never used again
Spiral
Multi-Processor
One Time Pad
Fire Suppression
31. To create a copy of data as a precaution against the loss or damage of the original data.
Simulation Test
Multi-Processor
Cross Certification
Backup
32. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Codec
Recovery Strategy
Residual Risk
Incident Response Team
33. The one person responsible for data - its classification and control setting
Labeling
Firewall
Information Owner
Access Control Attacks
34. Data or interference that can trigger a false positive
Business Impact Analysis
Noise
High-Risk Areas
Multi-Tasking
35. Program that inappropriately collects private data or activity
Spyware
Test Plan
Residual Risk
Proxies
36. To break a business process into separate functions and assign to different people
Job Training
Discretionary
Masquerading
Separation Of Duties
37. Quantity of risk remaining after a control is applied
Bollard
Residual Risk
Initialization Vector
Protection
38. Information about a particular data set
Metadata
Liability
Shift Cipher (Caesar)
Access Control
39. To execute more than one instruction at an instant in time
Data Backups
Cross-Site Scripting
Multi-Processing
Site Policy
40. High level design or model with a goal of consistency - integrity - and balance
Waterfall
Conflict Of Interest
Degauss
Architecture
41. A program with an inappropriate second purpose
Security Kernel
Inheritance
Trojan Horse
Application Programming Interface
42. The event signaling an IDS to produce an alarm when no attack has taken place
False Attack Stimulus
Safeguard
Business Unit Recovery
Computer System Evidence
43. Unsolicited commercial email
Spam
Detective
Distributed Denial Of Service
Confidence Value
44. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Chain Of Custody
Control Type
Business Continuity Program
War Dialing
45. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Phishing
Forensic Copy
3 Types of harm Addressed in computer crime laws
Business Impact Assessment (BIA)
46. Statistical probabilities of a collision are more likely than one thinks
Legacy Data
Birthday Attack
Inheritance
Data Custodian
47. Location to perform the business function
Emergency Operations Center (EOC)
Administrative Access Controls
Alternate Site
Common Law
48. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Acronym for American Standard Code for Information Interchange (ASCII)
Multi-Core
Redundant Servers
Centralized Access Control Technologies
49. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Modification
Method
Message Digest
Information Risk Management (IRM)
50. Substitution at the word or phrase level
Code
Interference (Noise)
SYN Flooding
Attacker (Black hat - Hacker)