SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Final purpose or result
Payload
Technical Access Controls
Denial Of Service
Disaster
2. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Operational Exercise
Business Continuity Steering Committee
Walk Though
TIFF (Tagged Image File Format)
3. A control after attack
Countermeasure
Security Clearance
Machine Language (Machine Code)
Quantitative Risk Analysis
4. Owner directed mediation of access
Alarm Filtering
Discretionary
Forensic Copy
Exercise
5. To start business continuity processes
5 Rules Of Evidence
Activation
Authentic
Active Data
6. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Algorithm
Operational Exercise
Exercise
Worldwide Interoperability for Microwave Access (WI-MAX )
7. Independent malware that requires user interaction to execute
Cryptanalysis
Trusted Computing Base
Virus
Internal Use Only
8. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Object Oriented Programming (OOP)
Threat Agent
Administrative Laws
Mirroring
9. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Honeynet
Discretionary
Policy
Site Policy Awareness
10. OOP concept of a class's details to be hidden from object
Encapsulation
Marking
Protection
Shift Cipher (Caesar)
11. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
Forward Recovery
TEMPEST
Investigation
Alternate Data Streams (File System Forks)
12. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
Restoration
Transfer
Top Secret
Operational Exercise
13. A device that converts between digital and analog representation of data.
Remote Journaling
Coaxial Cable
Radio Frequency Interference (RFI)
Modems
14. A process state - (blocked) needing input before continuing
Analysis
Preemptive
Wait
Risk
15. What is will remain - persistence
Accurate
Key Space
Recovery Period
Durability
16. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Rogue Access Points
3 Types of harm Addressed in computer crime laws
System Life Cycle
Information Flow Model
17. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Emergency
Elements of Negligence
Orange Book D Classification
True Attack Stimulus
18. A template for the designing the architecture
Security Blueprint
Control Category
Supervisor Mode (monitor - system - privileged)
Non-Repudiation
19. Indivisible - data field must contain only one value that either all transactions take place or none do
ff Site
Moore's Law
Repeaters
Atomicity
20. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Triage
Stopped
File Shadowing
Hard Disk
21. Short period of low voltage.
Multilevel Security System
Certificate Revocation List (CRL)
Sag/Dip
Separation Of Duties
22. A database that contains the name - type - range of values - source and authorization for access for each data element
Data Dictionary
Physical Tampering
Classification
Encapsulation
23. Eavesdropping on network communications by a third party.
Botnet
Full-Interruption test
Sniffing
Internal Use Only
24. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Business Continuity Program
Labeling
Due Diligence
Databases
25. Unused storage capacity
Slack Space
Hearsay
Test Plan
Data Leakage
26. A type of attack involving attempted insertion - deletion or altering of data.
Modification
Slack Space
Multiplexers
Forward Recovery
27. Summary of a communication for the purpose of integrity
Surge
Message Digest
Hot Spares
Active Data
28. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Covert Channel
Crisis
File Server
Quantitative Risk Analysis
29. The one person responsible for data - its classification and control setting
Information Owner
Tactical
Mirroring
Domain
30. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Notification
Electromagnetic Interference (EMI)
Data Backups
Rollback
31. Trading one for another
Authorization
Substitution
Simulation
Spam
32. The study of cryptography and cryptanalysis
Kerckhoff's Principle
Embedded Systems
Replication
Cryptology
33. Malware that makes small random changes to many data points
Recovery
Orange Book C Classification
Data Diddler
SYN Flooding
34. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Application Programming Interface
ITSEC
Framework
Security Domain
35. Autonomous malware that requires a flaw in a service
Disk Mirroring
Application Programming Interface
Packet Filtering
Worm
36. Descrambling the encrypted message with the corresponding key
Decipher
Full Test (Full Interruption)
Surge
Incident Handling
37. Periodic - automatic and transparent backup of data in bulk.
Centralized Access Control Technologies
Risk Assessment / Analysis
Burn
Electronic Vaulting
38. Communication of a security incident to stakeholders and data owners.
Notification
Maximum Tolerable Downtime (MTD)
Trade Secret
Least Privilege
39. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Fiber Optics
Network Attached Storage (NAS)
Trusted Computing Base
Sampling
40. The hard drive
2-Phase Commit
Secondary Storage
Desk Check Test
Embedded Systems
41. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Redundant Servers
Digital Certificate
Forensic Copy
Machine Language (Machine Code)
42. A subnetwork with storage devices servicing all servers on the attached network.
Custodian
Storage Area Network (SAN)
Incident Handling
Initialization Vector
43. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Alternate Data Streams (File System Forks)
Multilevel Security System
The ACID Test
War Dialing
44. Mitigate damage by isolating compromised systems from the network.
Cookie
Mandatory Access Control (MAC)
Containment
Plain Text
45. Forgery of the sender's email address in an email header.
Blind Testing
Masked/Interruptible
Emergency
E-Mail Spoofing
46. Controls for termination of attempt to access object
Information Owner
Byte Level Deletion
Disaster Recovery Teams (Business Recovery Teams)
Intrusion Prevention Systems
47. Return to a normal state
Administrative Law
Recovery
Identification
Forward Recovery
48. Vehicle stopping object
Revocation
Key Escrow
Bollard
Damage Assessment
49. Recording activities at the keyboard level
Cache
Primary Storage
Orange Book A Classification
Keystroke Logging
50. Moving letters around
Fire Prevention
Permutation /Transposition
Man-In-The-Middle Attack
Need-To-Know