SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Virtual Memory
Civil Law
Examples of non-technical security components
Technical Access Controls
2. Pertaining to law - accepted by a court
Fragmented Data
Trade Secret
War Dialing
Admissible
3. Event(s) that cause harm
Checklist Test
Incident
Physical Tampering
Critical Infrastructure
4. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Threats
Integrated Test
BCP Testing Drills and Exercises
Polymorphism
5. Hiding the fact that communication has occurred
Steganography
Simulation Test
Incident
Database Replication
6. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Framework
Legacy Data
Cold Site
Business Impact Analysis
7. Owner directed mediation of access
Electronic Vaulting
Debriefing/Feedback
Data Warehouse
Discretionary
8. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
MOM
Directive
Containment
Orange Book C Classification
9. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Gateway
Need-To-Know
Copyright
Distributed Denial Of Service
10. Some systems are actually run at the alternate site
Parallel Test
Watermarking
Content Dependent Access Control
Information Flow Model
11. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Data Hiding
Checklist Test (desk check)
Remote Journaling
Administrative Law
12. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Checkpoint
Voice Over IP (VOIP)
Governance
Cross-Site Scripting
13. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Digital Signature
Confidence Value
Detective
Parallel Test
14. A covert storage channel on the file attribute
Trademark
Alternate Data Streams (File System Forks)
Orange Book B1 Classification
Simulation Test
15. A temporary public file to inform others of a compromised digital certificate
Surge Suppressor
Certificate Revocation List (CRL)
Durability
Archival Data
16. Reduction of voltage by the utility company for a prolonged period of time
Memory Management
Brownout
Activation
Threats
17. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
Incident
Reciprocal Agreement
Disaster Recovery Teams (Business Recovery Teams)
18. Controls for logging and alerting
Chain Of Custody
Work Factor
Alarm Filtering
Intrusion Detection Systems
19. Potential danger to information or systems
Hard Disk
Private Branch Exchange (PBX)
False Negative
Threats
20. An unintended communication path
Walk Though
Covert Channel
Access Control
Disaster Recovery Plan
21. Transaction controls for a database - a return to a previous state
Database Replication
Brownout
Rollback
Criminal Law
22. A Denial of Service attack that floods the target system with connection requests that are not finalized.
Evidence
Discretionary Access Control (DAC)
SYN Flooding
Checklist Test (desk check)
23. A programming design concept which abstracts one set of functions from another in a serialized fashion
Governance
Mandatory Access Control (MAC)
Dictionary Attack
Layering
24. A risk assessment method - measurable real money cost
Quantitative
Life Cycle of Evidence
Structured Walk-Through Test
TIFF (Tagged Image File Format)
25. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Satellite
Virus
Operational Impact Analysis
Residual Risk
26. Induces a crime - tricks a person - and is illegal
Time Of Check/Time Of Use
Targeted Testing
Forward Recovery
Entrapment
27. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Redundant Servers
Work Factor
Common Law
28. An alert or alarm that is triggered when no actual attack has taken place
Emergency Operations Center (EOC)
Orange Book C Classification
False (False Positive)
TIFF (Tagged Image File Format)
29. Recognition of an individual's assertion of identity.
Containment
Access Point
Initialization Vector
Identification
30. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
ISO/IEC 27001
Classification
Procedure
Surveillance
31. Communication of a security incident to stakeholders and data owners.
Exercise
Algorithm
Notification
Supervisor Mode (monitor - system - privileged)
32. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
War Driving
False (False Positive)
Entrapment
33. A failure of an IDS to detect an actual attack
Disk Mirroring
False Negative
Log
Kerckhoff's Principle
34. Ertaining to a number system that has just two unique digits.
Spiral
Admissible
Atomicity
Binary
35. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
SQL Injection
Transients
Fire Classes
JPEG (Joint Photographic Experts Group)
36. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Custodian
The ACID Test
Hijacking
IP Fragmentation
37. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Fiber Optics
Virus
Orange Book B2 Classification
TNI (Red Book)
38. Information about data or records
Metadata
Security Blueprint
Brouter
Generator
39. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Rogue Access Points
File Server
Fire Classes
Reciprocal Agreement
40. Binary decision by a system of permitting or denying access to the entire system
Interference (Noise)
Central Processing Unit (CPU)
Policy
Authentication
41. Unchecked data which spills into another location in memory
Admissible
Aggregation
False (False Positive)
Buffer Overflow
42. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Cache
Walk Though
Event
Classification Scheme
43. Specific format of technical and physical controls that support the chosen framework and the architecture
Infrastructure
Open Mail Relay Servers
Privacy Laws
Hash Function
44. System mediation of access with the focus on the context of the request
Content Dependent Access Control
Complete
Targeted Testing
Slack Space
45. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Emergency Procedures
Bumping
Information Technology Security Evaluation Criteria - ITSEC
Archival Data
47. A design methodology which executes in a linear one way fashion
Non-Repudiation
Waterfall
Containment
Worldwide Interoperability for Microwave Access (WI-MAX )
48. With enough computing power trying all possible combinations
Brute Force
File Shadowing
Data Backups
Data Custodian
49. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Private Branch Exchange (PBX)
Data Backups
Operational Exercise
Deadlock
50. The principles a person sets for themselves to follow
Modification
Recovery Point Objective (RPO)
Hub
Ethics