SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uncleared buffers or media
Contact List
Orange Book D Classification
Liability
Object Reuse
2. Try a list of words in passwords or encryption keys
Dictionary Attack
Business Impact Analysis
Virus
Call Tree
3. A layer 2 device that used to connect two or more network segments and regulate traffic.
Top Secret
Business Continuity Planning (BCP)
Access Control Matrix
Switches
4. Impossibility of denying authenticity and identity
Non-Repudiation
Byte
Proxies
Fiber Optics
5. An encryption method that has a key as long as the message
Running Key
Databases
Alert
Byte
6. A state for operating system tasks only
Mitigate
Supervisor Mode (monitor - system - privileged)
Backup
Codec
7. Power surge
Technical Access Controls
Alternate Site
Electrostatic Discharge
Administrative Laws
8. Calculation encompassing threats - vulnerabilities and assets
TEMPEST
True Attack Stimulus
Total Risk
Incident
9. Mediation of covert channels must be addressed
Threat Agent
CobiT
Information Flow Model
Voice Over IP (VOIP)
10. A template for the designing the architecture
Qualitative
Security Blueprint
Recovery Time Objectives
Cross-Site Scripting
11. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Full Test (Full Interruption)
Simulation
Recovery Strategy
Internal Use Only
12. A device that provides the functions of both a bridge and a router.
Running
Brouter
Countermeasure
Deletion
13. Location to perform the business function
Alternate Site
Cache
Gateway
Watermarking
14. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Governance
Lattice
Atomicity
Wireless Fidelity (Wi-Fi )
15. Business and technical process of applying security software updates in a regulated periodic way
Twisted Pair
Critical Records
Patch Management
Contact List
16. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Intrusion Prevention Systems
CPU Cache
Structured Walkthrough
Emergency Procedures
17. Weak evidence
Integrated Test
Walk Though
Hearsay
Disk Mirroring
18. Using small special tools all tumblers of the lock are aligned - opening the door
Compiler
IP Fragmentation
Picking
Structured Walk-Through Test
19. Requirement to take time off
Safeguard
Mandatory Vacations
Governance
Data Owner
20. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Evidence
Phishing
Surveillance
Non-Repudiation
21. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
Cross Training
Hot Spares
User
Operational Exercise
22. Intellectual property protection for marketing efforts
Trademark
Preemptive
Site Policy Awareness
Business Continuity Steering Committee
23. A process state - to be executing a process on the CPU
Running
ISO/IEC 27001
Orange Book D Classification
Access Control Matrix
24. To break a business process into separate functions and assign to different people
Encipher
Kerckhoff's Principle
Separation Of Duties
Ring Protection
25. A choice in risk management - to implement a control that limits or lessens negative effects
Brouter
One Time Pad
Incident Handling
Mitigate
26. Just enough access to do the job
Injection
Locard's Principle
Cookie
Least Privilege
27. Employment education done once per position or at significant change of function
Job Training
Encryption
Tar Pits
War Dialing
28. Evaluation of a system without prior knowledge by the tester
Side Channel Attack
Blind Testing
Birthday Attack
Vital Record
29. Converts a high level language into machine language
Certification Authority
Hearsay
Kerberos
Assembler
30. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Framework
Disk Mirroring
Inrush Current
Plaintext
31. An asymmetric cryptography mechanism that provides authentication.
Damage Assessment
Vital Record
Concentrator
Digital Signature
32. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Ethics
Encipher
Worldwide Interoperability for Microwave Access (WI-MAX )
Boot (V.)
33. Amount of time for restoring a business process or function to normal operations without major loss
Microwave
Reference Monitor
Machine Language (Machine Code)
Maximum Tolerable Downtime (MTD)
34. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Business Recovery Team
Labeling
TEMPEST
Wireless Fidelity (Wi-Fi )
35. Subject based description of a system or a collection of resources
Fire Classes
Common Criteria
On-Site
Capability Tables
36. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Embedded
Worldwide Interoperability for Microwave Access (WI-MAX )
Initialization Vector
Business Interruption
37. To move from location to location - keeping the same function
Tort
Examples of non-technical security components
Convincing
Job Rotation
38. Pertaining to law - lending it self to one side of an argument
Convincing
Fragmented Data
Proxies
Covert Channel
39. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Conflict Of Interest
Recovery
System Life Cycle
Multiplexers
40. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Multilevel Security System
Reference Monitor
Digital Signature
Log
41. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Control
Work Factor
Virtual Memory
Instance
42. One way encryption
Hash Function
Restoration
Data Backup Strategies
Contingency Plan
43. Using many alphabets
Polyalphabetic
Birthday Attack
Private Branch Exchange (PBX)
Digital Signature
44. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Business Records
False (False Positive)
Forward Recovery
Entrapment
45. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Bollard
Mock Disaster
Total Risk
Residual Risk
46. Control category - more than one control on a single asset
Smurf
Compensating
Malformed Input
Archival Data
47. Joining two pieces of text
Structured Walk-Through Test
Worm
Concatenation
Interception
48. Individuals and departments responsible for the storage and safeguarding of computerized data.
Criminal Law
Distributed Denial Of Service
Computer Forensics
Data Custodian
49. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
3 Types of harm Addressed in computer crime laws
Standalone Test
Compression
Relocation
50. What is will remain - persistence
Durability
Metadata
Multilevel Security System
Full Test (Full Interruption)