SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A back up type - where the organization has excess capacity in another location.
Distributed Processing
Forward Recovery
Residual Data
Tracking
2. Those who initiate the attack
Trade Secret
Durability
Threat Agent
Virtual Memory
3. Prolonged loss of commercial power
CPU Cache
File Extension
Internal Use Only
Blackout
4. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Side Channel Attack
Packet Filtering
Off-Site Storage
Concentrator
5. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Key Escrow
Processes are Isolated By
Data Leakage
File Extension
6. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Proxies
Business Continuity Program
Repeaters
Cryptology
7. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Operational Impact Analysis
Integrated Test
Virtual Memory
Byte
8. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Faraday Cage/ Shield
Memory Management
Technical Access Controls
Simulation
10. Security policy - procedures - and compliance enforcement
Examples of non-technical security components
Intrusion Detection Systems
Custodian
Remote Access Trojan
11. Written internalized or nationalized norms that are internal to an organization
Standard
Multi-Processor
Data Marts
Switches
12. Malware that makes many small changes over time to a single data point or system
Salami
Near Site
Redundant Servers
Site Policy Awareness
13. Two certificate authorities that trust each other
Full-Interruption test
Structured Walkthrough
Cross Certification
File Level Deletion
14. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Acronym for American Standard Code for Information Interchange (ASCII)
Locard's Principle
Business Interruption
Interception
15. Control category- to record an adversary's actions
Detective
Access Point
Compiler
Cold Site
16. A secure connection to another network.
Shift Cipher (Caesar)
Kerberos
Gateway
Privacy Laws
17. Responsibility of a user for the actions taken by their account which requires unique identification
Accountability
Assembler
Method
Interception
18. All of the protection mechanism in a computer system
Compiler
Near Site
Birthday Attack
Trusted Computing Base
19. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Data Leakage
Total Risk
Discretionary Access Control (DAC)
Need-To-Know
20. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Criminal Law
Proxies
Honeynet
Technical Access Controls
21. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Initialization Vector
Procedure
Business Interruption
Access Control Lists
22. Controls for logging and alerting
Firewalls
Remanence
UPS
Intrusion Detection Systems
23. Sphere of influence
Surge Suppressor
Source Routing Exploitation
Covert Channel
Domain
24. Low level - pertaining to planning
User
Corrective
Tactical
Incident Handling
25. To know more than one job
Process Isolation
Fragmented Data
Security Domain
Cross Training
26. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
BCP Testing Drills and Exercises
Multi-Tasking
Wait
27. Eavesdropping on network communications by a third party.
Due Care
Sniffing
True Attack Stimulus
Residual Risk
28. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Brute Force
Classification Scheme
Data Dictionary
Fragmented Data
29. Recovery alternative - complete duplication of services including personnel
Fire Suppression
Patent
Mirrored Site
Masked/Interruptible
30. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Fiber Optics
Threat Agent
Object Oriented Programming (OOP)
Codec
31. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Archival Data
High-Risk Areas
Critical Records
Qualitative
32. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Fault
Recovery Period
Source Routing Exploitation
Substitution
33. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
2-Phase Commit
Multilevel Security System
Information Risk Management (IRM)
System Life Cycle
34. A copy of transaction data - designed for querying and reporting
Full Test (Full Interruption)
Simulation
Distributed Processing
Data Warehouse
35. Recording the Who What When Where How of evidence
Chain Of Custody
Byte Level Deletion
Running
Remanence
36. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Cross Training
SQL Injection
Reference Monitor
2-Phase Commit
37. Substitution at the word or phrase level
Interpreter
Data Recovery
Need-To-Know
Code
38. Recovery alternative - short-term - high cost movable processing location
Least Privilege
Security Domain
Binary
Mobile Site
39. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
BCP Testing Drills and Exercises
Life Cycle of Evidence
Modification
Coaxial Cable
40. Unauthorized wireless network access device.
Hub
Rogue Access Points
Checkpoint
Revocation
41. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Standard
Critical Infrastructure
Ethics
Repeaters
42. Intellectual property protection for marketing efforts
Trademark
Computer System Evidence
The ACID Test
Data Dictionary
43. The study of cryptography and cryptanalysis
Data Dictionary
Marking
Cryptology
Recovery Period
44. Regular operations are stopped and where processing is moved to the alternate site.
Surge
Full-Interruption test
Phishing
Man-In-The-Middle Attack
45. A telephone exchange for a specific office or business.
Residual Risk
Certificate Revocation List (CRL)
Computer Forensics
Private Branch Exchange (PBX)
46. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Surge
Phishing
ISO/IEC 27002
Pervasive Computing and Mobile Computing Devices
47. An unintended communication path
Race Condition
Covert Channel
High-Risk Areas
File Shadowing
48. A signal suggesting a system has been or is being attacked.
Mandatory Access Control (MAC)
Alert/Alarm
Bit
Dangling Pointer
49. Using many alphabets
Twisted Pair
Polyalphabetic
Storage Area Network (SAN)
Physical Tampering
50. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Labeling
Site Policy Awareness
Standard
Incident Response