SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Keystroke Logging
Business Unit Recovery
Sampling
Conflict Of Interest
2. To collect many small pieces of data
Firewalls
Contingency Plan
Business Continuity Program
Aggregation
3. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Bollard
Hard Disk
Classification
Satellite
4. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Chain Of Custody
Remote Journaling
Failure Modes and Effect Analysis (FEMA)
Multilevel Security System
5. Mathematical function that determines the cryptographic operations
Revocation
Electromagnetic Interference (EMI)
Durability
Algorithm
6. Outputs within a given function are the same result
Adware
Collisions
Databases
Hash Function
7. Most granular organization of controls
Examples of technical security components
Kernel
Control Category
Chain of Custody
8. Planning with a goal of returning to the normal business function
Steganography
Time Of Check/Time Of Use
Failure Modes and Effect Analysis (FEMA)
Restoration
9. Used to code/decode a digital data stream.
Identification
System Life Cycle
Codec
Examples of technical security components
10. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Cross-Site Scripting
Change Control
Inference
Orange Book D Classification
11. May be responsible for overall recovery of an organization or unit(s).
Off-Site Storage
Checklist Test
DR Or BC Coordinator
Surge Suppressor
12. Responsibility of a user for the actions taken by their account which requires unique identification
Access Control Matrix
Accountability
Honeynet
Deterrent
13. Consume resources to a point of exhaustion - loss of availability
Denial Of Service
Archival Data
Countermeasure
Site Policy Awareness
14. Malware that subverts the detective controls of an operating system
File Level Deletion
Rootkit
Analysis
Hearsay
15. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Detective
Resumption
Least Privilege
Territoriality
16. Transaction controls for a database - a return to a previous state
Buffer Overflow
Triage
Rollback
Full-Interruption test
17. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Hacker
Multi-Tasking
Proxies
Incident Response
18. Written step-by-step actions
Procedure
Cache
File Level Deletion
Contingency Plan
19. To assert or claim credentialing to an authentication system
Encryption
False Negative
Log
Identification
20. Wrong against society
Denial Of Service
Administrative Laws
Prevention
Criminal Law
21. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Mantrap (Double Door System)
Polymorphism
Orange Book C2 Classification
ff Site
22. A collection of information designed to reduce duplication and increase integrity
Entrapment
Compensating
Databases
Separation Of Duties
23. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Archival Data
Orange Book B2 Classification
Directive
Criminal Law
24. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Key Clustering
Shift Cipher (Caesar)
Embedded
25. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. To move from location to location - keeping the same function
Business Continuity Steering Committee
Virus
Durability
Job Rotation
27. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Byte
Entrapment
Business Continuity Program
Residual Risk
28. A one way - directed graph which indicates confidentiality or integrity flow
Fiber Optics
Lattice
Mirroring
Memory Management
29. Substitution at the word or phrase level
Mobile Recovery
Code
Rootkit
Accreditation
30. A risk assessment method - measurable real money cost
Quantitative
IDS Intrusion Detection System
2-Phase Commit
Classification
31. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Cipher Text
Simulation Test
Analysis
Tar Pits
32. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Monitor
The ACID Test
Satellite
Information Flow Model
33. Memory management technique which allows data to be moved from one memory address to another
Relocation
Off-Site Storage
Recovery
Interception
34. A device that provides the functions of both a bridge and a router.
Sequence Attacks
TCSEC (Orange Book)
Brouter
Mobile Site
35. Intermediate level - pertaining to planning
Operational
Operational Test
Cryptology
Physical Tampering
36. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
IP Fragmentation
Memory Management
Tactical
Rogue Access Points
37. Vehicle or tool that exploits a weakness
Business Unit Recovery
Fraggle
Centralized Access Control Technologies
Threats
38. A condition in which neither party is willing to stop their activity for the other to complete
Deadlock
Notification
Electronic Vaulting
Technical Access Controls
39. Act of luring an intruder and is legal.
Repeaters
Enticement
Containment
Application Programming Interface
40. A type a computer memory that temporarily stores frequently used information for quick access.
Multiplexers
Cookie
Site Policy
Cache
41. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Open Mail Relay Servers
Simulation
Orange Book C2 Classification
Emanations
42. All of the protection mechanism in a computer system
Operational Impact Analysis
Trusted Computing Base
Emergency Operations Center (EOC)
Procedure
43. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. A shield against leakage of electromagnetic signals.
Burn
Faraday Cage/ Shield
Degauss
Incident Response
45. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Targeted Testing
Data Dictionary
Interpreter
ISO/IEC 27002
46. A record that must be preserved and available for retrieval if needed.
Forward Recovery
Vital Record
Test Plan
Recovery Period
47. System mediation of access with the focus on the context of the request
Content Dependent Access Control
Qualitative
Trademark
Transients
48. A distributed system's transaction control that requires updates to complete or rollback
Bit
2-Phase Commit
Mandatory
Layering
49. Abstract and mathematical in nature - defining all possible states - transitions and operations
Honeypot
Proprietary
State Machine Model
Guidelines
50. Key
Civil Law
Cryptovariable
Physical Tampering
Permutation /Transposition