SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who wants to cause harm
Machine Language (Machine Code)
Surge
Hot Spares
Attacker (Black hat - Hacker)
2. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Salami
Concentrator
Conflict Of Interest
Marking
3. An administrative unit or a group of objects and subjects controlled by one reference monitor
Checksum
Security Domain
Ethics
Digital Signature
4. Organized group of compromised computers
Domain
Botnet
Reciprocal Agreement
Data Warehouse
5. Descrambling the encrypted message with the corresponding key
Decipher
Legacy Data
ISO/IEC 27001
Replication
6. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Business Interruption Insurance
Double Blind Testing
Reference Monitor
Durability
7. A test conducted on one or more components of a plan under actual operating conditions.
Operational Test
Marking
Fire Classes
Due Care
8. Controls for logging and alerting
Intrusion Detection Systems
Top Secret
Keystroke Logging
Cryptology
9. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Investigation
Journaling
Network Attached Storage (NAS)
CobiT
10. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Forensic Copy
Denial Of Service
Near Site
Centralized Access Control Technologies
11. To jump to a conclusion
Inference
Watermarking
Honeynet
Double Blind Testing
12. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification
Civil Or Code Law
Keystroke Logging
Bit
13. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Change Control
Repeaters
Mandatory
Separation Of Duties
14. Guidelines within an organization that control the rules and configurations of an IDS
Administrative Law
Acronym for American Standard Code for Information Interchange (ASCII)
Vulnerability
Site Policy
15. Responsibility of a user for the actions taken by their account which requires unique identification
Accountability
Cipher Text
Near Site
Administrative Laws
16. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
File Extension
Structured Walk-Through Test
Kernel
Civil Law
17. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. To assert or claim credentialing to an authentication system
Spiral
Activation
Identification
Layering
19. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
On-Site
Basics Of Secure Design
Tapping
War Driving
20. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Incident Manager
TNI (Red Book)
Disaster Recovery Plan
Public Key Infrastructure (PKI)
21. The core logic engine of an operating system which almost never changes
SQL Injection
Message Digest
Ethics
Kernel
22. The core of a computer that calculates
Central Processing Unit (CPU)
Checklist Test (desk check)
Critical Records
Voice Over IP (VOIP)
23. Control category- to discourage an adversary from attempting to access
Permutation /Transposition
Tort
The ACID Test
Deterrent
24. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
Analysis
Surveillance
Radio Frequency Interference (RFI)
TEMPEST
25. Pertaining to law - accepted by a court
Checklist Test
Journaling
Safeguard
Admissible
26. Sphere of influence
Patch Panels
ITSEC
Domain
Databases
27. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Masked/Interruptible
Data Custodian
Warm Site
Modems
28. A technology that reduces the size of a file.
Threat Agent
Business Recovery Timeline
Compression
Spyware
29. Potentially compromising leakage of electrical or acoustical signals.
EMI
Concentrator
Emanations
Test Plan
30. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Access Control Lists
Recovery Period
Examples of non-technical security components
Security Domain
31. Reduces causes of fire
Critical Infrastructure
Elements of Negligence
Multi-Tasking
Fire Prevention
32. A basic level of network access control that is based upon information contained in the IP packet header.
Packet Filtering
Electronic Vaulting
Hot Site
Cipher Text
33. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Contingency Plan
Orange Book D Classification
Emergency
Memory Management
34. Hardware or software that is part of a larger system
Trusted Computing Base
Voice Over IP (VOIP)
Embedded
Log
35. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Modems
Steganography
Alert
Deletion
36. System of law based upon what is good for society
Civil Or Code Law
Multilevel Security System
Tracking
Cryptovariable
37. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Tar Pits
Remote Access Trojan
Cryptography
Internal Use Only
38. Recognition of an individual's assertion of identity.
Cross Certification
Content Dependent Access Control
Hard Disk
Identification
39. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Fiber Optics
Databases
Eavesdropping
Parallel Test
40. Communication of a security incident to stakeholders and data owners.
Crisis
Notification
Resumption
Satellite
41. Act of scrambling the cleartext message by using a key.
Encipher
Non-Repudiation
Privacy Laws
Qualitative
42. Owner directed mediation of access
Discretionary
Spam
Non-Discretionary Access Control
Operational Test
43. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Physical Tampering
Business Interruption
CPU Cache
Distributed Processing
44. The problems solving state - the opposite of supervisor mode
Administrative Law
User Mode (problem or program state)
Due Diligence
Crisis
45. Mathematical function that determines the cryptographic operations
Compartmentalize
Access Control Matrix
Multi-Programming
Algorithm
46. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Business Recovery Timeline
Covert Channel
Key Management
Alert
47. Uses two or more legal systems
Mixed Law System
Technical Access Controls
Ring Protection
Protection
48. To move from location to location - keeping the same function
MOM
War Dialing
Due Care
Job Rotation
49. Binary decision by a system of permitting or denying access to the entire system
Authentication
ff Site
Collisions
Quantitative
50. Someone who want to know how something works - typically by taking it apart
Relocation
Ethics
Hacker
Analysis