SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recording activities at the keyboard level
Keystroke Logging
Key Management
False Negative
Mitigate
2. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Voice Over IP (VOIP)
Repeaters
Recovery Point Objective (RPO)
Routers
3. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Encapsulation
Application Programming Interface
Lattice
Algorithm
4. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Business Impact Analysis
Failure Modes and Effect Analysis (FEMA)
Multi-Programming
Digital Certificate
5. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Interception
Primary Storage
Interference (Noise)
Smurf
6. Event(s) that cause harm
Mission-Critical Application
Recovery
Incident
Exposure
7. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Total Risk
Notification
EMI
Orange Book B2 Classification
8. To execute more than one instruction at an instant in time
Firmware
Symmetric
Multi-Processing
Sniffing
9. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Object
Business Continuity Program
Trade Secret
Mobile Recovery
10. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Binary
Exposure
Proxies
Separation Of Duties
11. A program with an inappropriate second purpose
Risk Mitigation
User
Trojan Horse
Codec
12. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Brouter
Man-In-The-Middle Attack
Alternate Site
Resumption
13. Guidelines within an organization that control the rules and configurations of an IDS
Site Policy
Business Continuity Planning (BCP)
Exposure
Triage
14. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Hub
Application Programming Interface
Qualitative
Critical Records
15. Total number of keys available that may be selected by the user of a cryptosystem
Layering
Guidelines
File Server
Key Space
16. Pertaining to law - lending it self to one side of an argument
Polyalphabetic
Convincing
CobiT
Job Training
17. A type of attack involving attempted insertion - deletion or altering of data.
Masked/Interruptible
Archival Data
Modification
Operational
18. Specific format of technical and physical controls that support the chosen framework and the architecture
Compartmentalize
Infrastructure
Restoration
Operational Impact Analysis
19. The core logic engine of an operating system which almost never changes
Cross-Site Scripting
Kernel
Wait
File Shadowing
20. Subset of operating systems components dedicated to protection mechanisms
Security Blueprint
Codec
Mitigate
Security Kernel
21. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Technical Access Controls
Overlapping Fragment Attack
Orange Book D Classification
Recovery Strategy
22. A type a computer memory that temporarily stores frequently used information for quick access.
Binary
Race Condition
Mandatory
Cache
23. Recording the Who What When Where How of evidence
Locard's Principle
Quantitative
Business Interruption
Chain Of Custody
24. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Disaster Recovery Plan
Electromagnetic Interference (EMI)
Trojan Horse
Byte Level Deletion
25. A layer 2 device that used to connect two network segments and regulate traffic.
2-Phase Commit
Bridge
Total Risk
Operational Exercise
26. The collection and summation of risk data relating to a particular asset and controls for that asset
Orange Book B2 Classification
Crisis
Risk Assessment
Payload
27. A subnetwork with storage devices servicing all servers on the attached network.
Education
Incident Manager
Storage Area Network (SAN)
Cipher Text
28. Communicate to stakeholders
Durability
Business Impact Analysis
Fire Suppression
Debriefing/Feedback
29. Encryption system using a pair of mathematically related unequal keys
Asymmetric
Discretionary Access Control (DAC)
Data Dictionary
Guidelines
30. To evaluate the current situation and make basic decisions as to what to do
Triage
Corrective
Cross Training
Metadata
31. Hardware or software that is part of a larger system
Open Mail Relay Servers
ff Site
Embedded
File
32. Effort/time needed to overcome a protective measure
Remanence
Work Factor
Total Risk
Disaster Recovery Teams (Business Recovery Teams)
33. Transaction controls for a database - a return to a previous state
Teardrop
Highly Confidential
Rollback
Operating
34. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Proxies
Hot Site
Bollard
Analysis
35. The principles a person sets for themselves to follow
Least Privilege
File
Firewall
Ethics
36. A technology that reduces the size of a file.
Multilevel Security System
Compression
Certification
Decipher
37. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Remote Journaling
Checkpoint
Life Cycle of Evidence
Secondary Storage
38. Someone who wants to cause harm
Attacker (Black hat - Hacker)
Forward Recovery
Isolation
Kernel
39. Some systems are actually run at the alternate site
Interpreter
Compression
Parallel Test
Accountability
40. Line noise that is superimposed on the supply circuit.
Multilevel Security System
Transients
Off-Site Storage
On-Site
41. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Site Policy Awareness
ISO/IEC 27002
Worm
Critical Functions
42. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Fraggle
Mirroring
Deletion
Worm
43. Weakness or flaw in an asset
Vulnerability
Operating
Alternate Data Streams (File System Forks)
Compiler
44. Induces a crime - tricks a person - and is illegal
Entrapment
Watermarking
Privacy Laws
Malformed Input
45. Code breaking - practice of defeating the protective properties of cryptography.
Virus
Byte Level Deletion
Cryptanalysis
Spyware
46. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Key Escrow
True Attack Stimulus
Accreditation
Simulation Test
47. Just enough access to do the job
Least Privilege
Desk Check Test
Tracking
Plan Maintenance Procedures
48. System of law based upon what is good for society
Bridge
Disk Mirroring
Fragmented Data
Civil Or Code Law
49. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Checklist Test (desk check)
Incident Response
Business Recovery Team
Test Plan
50. Fault tolerance for power
Liability
Recovery Point Objective (RPO)
Generator
Due Diligence