SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To assert or claim credentialing to an authentication system
Coaxial Cable
Metadata
Interference (Noise)
Identification
2. Renders the file inaccessible to the operating system - available to reuse for data storage.
Administrative Access Controls
SYN Flooding
Event
File Level Deletion
3. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Corrective
Interpreter
Critical Infrastructure
Risk Mitigation
4. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Disaster Recovery Tape
Work Factor
Control Type
Complete
5. Responsibility of a user for the actions taken by their account which requires unique identification
Compartmentalize
Classification
Accountability
Class
6. Review of data
Coaxial Cable
Security Blueprint
Analysis
Incident Response
7. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Entrapment
Encapsulation
Stopped
Kerberos
8. A type of attack involving attempted insertion - deletion or altering of data.
Modification
Business Interruption Insurance
Brownout
Integrated Test
9. A process state - to be executing a process on the CPU
Multilevel Security System
Data Leakage
CobiT
Running
10. To know more than one job
Machine Language (Machine Code)
Risk Assessment
Cross Training
Database Shadowing
11. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Total Risk
Key Space
Emergency
Domain
12. A backup type - for databases at a point in time
Shadowing (file shadowing)
Fault
Countermeasure
Journaling
13. Code breaking - practice of defeating the protective properties of cryptography.
Physical Tampering
Cryptanalysis
Virus
Authentication
14. Quantity of risk remaining after a control is applied
Running Key
Surveillance
Residual Risk
True Attack Stimulus
15. Try a list of words in passwords or encryption keys
Criminal Law
Worm
Dictionary Attack
Database Replication
16. Descrambling the encrypted message with the corresponding key
File
Decipher
Administrative Law
Basics Of Secure Design
17. Forgery of the sender's email address in an email header.
E-Mail Spoofing
Information Risk Management (IRM)
Security Clearance
Cryptology
18. A Trojan horse with the express underlying purpose of controlling host from a distance
Cryptovariable
Remote Access Trojan
Data Marts
File Sharing
19. A state for operating system tasks only
Supervisor Mode (monitor - system - privileged)
Capability Tables
Business Continuity Steering Committee
Countermeasure
20. A electronic attestation of identity by a certificate authority
Open Mail Relay Servers
Radio Frequency Interference (RFI)
Digital Certificate
HTTP Response Splitting
21. The problems solving state - the opposite of supervisor mode
Hot Spares
User Mode (problem or program state)
Emergency Operations Center (EOC)
Containment
22. Business and technical process of applying security software updates in a regulated periodic way
TIFF (Tagged Image File Format)
Patch Management
Contingency Plan
Intrusion Prevention Systems
23. Memory management technique which allows data to be moved from one memory address to another
Fire Suppression
Consistency
Relocation
TCSEC (Orange Book)
24. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Honeynet
Twisted Pair
Disaster Recovery Plan
Sniffing
25. A covert storage channel on the file attribute
Alternate Data Streams (File System Forks)
Fire Prevention
Residual Data
Running
26. A process state - to be either be unable to run waiting for an external event or terminated
Stopped
Key Escrow
Cryptovariable
Logic Bomb
27. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Security Domain
Switches
Simulation
Incident Manager
28. Eavesdropping on network communications by a third party.
Polyalphabetic
Tapping
Guidelines
Separation Of Duties
29. DoS - Spoofing - dictionary - brute force - wardialing
Access Control Attacks
Criminal Law
Record Level Deletion
Fire Suppression
30. Reduces causes of fire
Authentic
Message Digest
Fire Prevention
Brownout
31. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Infrastructure
Key Management
Multi-Processor
Technical Access Controls
32. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Compartmentalize
Corrective
Centralized Access Control Technologies
Remote Journaling
33. Policy or stated actions
Key Clustering
Due Care
Intrusion Detection Systems
Administrative Law
34. Regular operations are stopped and where processing is moved to the alternate site.
Full-Interruption test
Work Factor
Threats
Life Cycle of Evidence
35. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Processes are Isolated By
Reciprocal Agreement
Full Test (Full Interruption)
Operating
36. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Mobile Site
Brownout
Codec
Data Integrity
37. A mathematical tool for verifying no unintentional changes have been made
Chain of Custody
Firewall
Full-Interruption test
Checksum
38. Abstract and mathematical in nature - defining all possible states - transitions and operations
State Machine Model
Atomicity
Test Plan
Radio Frequency Interference (RFI)
39. Record of system activity - which provides for monitoring and detection.
File Server
Log
Complete
Framework
40. Requirement to take time off
Mandatory Vacations
Integrated Test
Containment
Hot Site
41. OOP concept of an object's abilities - what it does
Recovery Time Objectives
Method
Aggregation
Encryption
42. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Administrative Access Controls
Masquerading
Intrusion Prevention Systems
Security Clearance
43. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Procedure
TCSEC (Orange Book)
Classification Scheme
Emergency Procedures
44. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Forensic Copy
Maximum Tolerable Downtime (MTD)
Trade Secret
Contact List
45. A telephone exchange for a specific office or business.
Firewall
Radio Frequency Interference (RFI)
Private Branch Exchange (PBX)
Framework
46. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Restoration
Security Blueprint
Conflict Of Interest
Strong Authentication
47. Pertaining to law - high degree of veracity
Accurate
3 Types of harm Addressed in computer crime laws
Threat Agent
Full-Interruption test
48. Memory management technique which allows subjects to use the same resource
Archival Data
Sharing
Authorization
Business Continuity Planning (BCP)
49. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Payload
Memory Management
Mock Disaster
Isolation
50. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Modems
True Attack Stimulus
Payload
Business Interruption