SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small data warehouse
Administrative Law
User
Injection
Data Marts
2. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Source Routing Exploitation
Decipher
Deterrent
Residual Risk
3. Program instructions based upon the CPU's specific architecture
Shielding
Machine Language (Machine Code)
Call Tree
Alert
4. Is secondhand and usually not admissible in court
Patch Panels
Mandatory Access Control (MAC)
Framework
Hearsay Evidence
5. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Recovery Time Objectives
Teardrop
Business Impact Assessment (BIA)
Ring Protection
6. Intellectual property protection for an invention
Mobile Recovery
Patent
Intrusion Prevention Systems
Operational Impact Analysis
7. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Sharing
Object
Exposure
Control
8. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Generator
Recovery Period
True Attack Stimulus
Multi-Core
9. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. System of law based upon what is good for society
Business Interruption Insurance
Privacy Laws
Governance
Civil Or Code Law
11. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Business Interruption
Incident Handling
Non-Discretionary Access Control
Running
12. A distributed system's transaction control that requires updates to complete or rollback
2-Phase Commit
Radio Frequency Interference (RFI)
Orange Book C2 Classification
Tort
13. Identification and notification of an unauthorized and/or undesired action
Off-Site Storage
Detection
Civil Or Code Law
Checkpoint
14. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Tapping
Record Level Deletion
Authentic
Virtual Memory
15. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
5 Rules Of Evidence
Trojan Horse
Network Attached Storage (NAS)
Picking
16. A disturbance that degrades performance of electronic devices and electronic communications.
Incident Manager
Radio Frequency Interference (RFI)
Digital Certificate
Voice Over IP (VOIP)
17. To load the first piece of software that starts a computer.
Boot (V.)
Message Digest
Satellite
Distributed Processing
18. Converts a high level language into machine language
Triage
Substitution
Assembler
Data Marts
19. Joining two pieces of text
Sag/Dip
Time Of Check/Time Of Use
Concatenation
Business Recovery Team
20. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Security Clearance
Deadlock
Multi-Party Control
True Attack Stimulus
21. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Orange Book B2 Classification
Authorization
Compensating
Critical Records
22. To smooth out reductions or increases in power
Modification
UPS
One Time Pad
Cryptanalysis
23. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Fraggle
Public Key Infrastructure (PKI)
File Server
Job Rotation
24. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Site Policy Awareness
Tort
Hard Disk
Firewall
25. The problems solving state - the opposite of supervisor mode
Virus
User Mode (problem or program state)
Hub
Strong Authentication
26. Summary of a communication for the purpose of integrity
Concatenation
Pervasive Computing and Mobile Computing Devices
Public Key Infrastructure (PKI)
Message Digest
27. Control type- that is communication based - typically written or oral
Distributed Denial Of Service
Administrative
Certificate Revocation List (CRL)
Operational Test
28. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Operational Impact Analysis
Reference Monitor
Dangling Pointer
Fault
29. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Change Control
Incident Response
Orange Book C2 Classification
BCP Testing Drills and Exercises
30. High level design or model with a goal of consistency - integrity - and balance
Pointer
ISO/IEC 27002
Capability Tables
Architecture
31. Uncleared buffers or media
Relocation
Processes are Isolated By
Degauss
Object Reuse
32. Effort/time needed to overcome a protective measure
Operational Exercise
Work Factor
System Downtime
Consistency
33. Substitution at the word or phrase level
Data Dictionary
Operational Exercise
Code
Legacy Data
34. Collection of data on business functions which determines the strategy of resiliency
Patch Management
Encapsulation
Business Impact Assessment (BIA)
Sniffing
35. A group or network of honeypots
Walk Though
Honeynet
Byte
Forensic Copy
36. Malware that makes many small changes over time to a single data point or system
Tapping
Salami
Packet Filtering
Chain Of Custody
37. To stop damage from spreading
Containment
Guidelines
War Driving
Hub
38. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Instance
Data Recovery
Time Of Check/Time Of Use
Decipher
39. To move from location to location - keeping the same function
Targeted Testing
Countermeasure
Accountability
Job Rotation
40. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Phishing
BCP Testing Drills and Exercises
Machine Language (Machine Code)
Layering
41. Transaction controls for a database - a return to a previous state
Rollback
Data Marts
Access Point
Infrastructure
42. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
CobiT
Criminal Law
Encapsulation
Data Backup Strategies
43. All of the protection mechanism in a computer system
Business Recovery Timeline
Key Escrow
Voice Over IP (VOIP)
Trusted Computing Base
44. Unauthorized access of network devices.
Code
Critical Records
Physical Tampering
Instance
45. A choice in risk management - to convince another to assume risk - typically by payment
Transfer
Fraggle
Object Reuse
Brownout
46. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Shift Cipher (Caesar)
Civil Law
Assembler
Data Backups
47. Eavesdropping on network communications by a third party.
Rogue Access Points
Cryptovariable
Disk Mirroring
Tapping
48. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Fire Classes
Fragmented Data
Due Care
Physical Tampering
49. Written step-by-step actions
Procedure
Data Recovery
Fraggle
Object Reuse
50. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Fiber Optics
State Machine Model
Call Tree
Masked/Interruptible