SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A electronic attestation of identity by a certificate authority
Mock Disaster
Process Isolation
Service Bureau
Digital Certificate
2. A protocol for the efficient transmission of voice over the Internet
Access Control Lists
Replication
Voice Over IP (VOIP)
Access Control
3. Wrong against society
Isolation
Criminal Law
Tapping
Brute Force
4. An administrative unit or a group of objects and subjects controlled by one reference monitor
Security Domain
Cold Site
Entrapment
Locard's Principle
5. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Classification Scheme
Education
Public Key Infrastructure (PKI)
Inheritance
6. An image compression standard for photographs
Sharing
JPEG (Joint Photographic Experts Group)
Desk Check Test
Job Training
7. Control type- that is communication based - typically written or oral
Accreditation
Complete
Standalone Test
Administrative
8. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Storage Area Network (SAN)
Business Impact Analysis
Substitution
Site Policy
9. An asymmetric cryptography mechanism that provides authentication.
Digital Signature
Disaster Recovery Plan
Firmware
Database Replication
10. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Countermeasure
Distributed Denial Of Service
Phishing
Control Category
11. The collection and summation of risk data relating to a particular asset and controls for that asset
Risk Assessment
Detection
Attacker (Black hat - Hacker)
Hard Disk
12. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Tar Pits
Virtual Memory
Tracking
Emergency
13. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Initialization Vector
High-Risk Areas
False Attack Stimulus
Detective
14. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Executive Succession
Mandatory Access Control (MAC)
Trademark
Orange Book D Classification
15. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Authentication
Near Site
Deadlock
Recovery
16. Event(s) that cause harm
Incident
Polymorphism
Mission-Critical Application
Transients
17. Autonomous malware that requires a flaw in a service
Worm
Spam
Test Plan
Double Blind Testing
18. Using small special tools all tumblers of the lock are aligned - opening the door
Prevention
Picking
Alarm Filtering
Access Control Lists
19. Hitting a filed down key in a lock with a hammer to open without real key
Checklist Test
Collisions
Access Control Attacks
Bumping
20. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Business Impact Assessment (BIA)
Data Leakage
Conflict Of Interest
Control Category
21. Hardware or software that is part of a larger system
Quantitative
Control
Mantrap (Double Door System)
Embedded
22. To assert or claim credentialing to an authentication system
Phishing
Message Digest
Identification
Civil Or Code Law
23. Someone who wants to cause harm
JPEG (Joint Photographic Experts Group)
Recovery
Attacker (Black hat - Hacker)
High-Risk Areas
24. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
Certification
Procedure
Labeling
25. A layer 2 device that used to connect two network segments and regulate traffic.
False (False Positive)
Honeypot
Tactical
Bridge
26. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Shielding
Classification Scheme
Degauss
Reciprocal Agreement
27. Less granular organization of controls -
Fire Prevention
Control Type
Access Control Matrix
User
28. A test conducted on one or more components of a plan under actual operating conditions.
Identification
Operational Test
Site Policy
Acronym for American Standard Code for Information Interchange (ASCII)
29. Tool which mediates access
Monitor
Fiber Optics
Radio Frequency Interference (RFI)
Control
30. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Ring Protection
Rollback
Packet Filtering
Complete
31. Recovery alternative - a building only with sufficient power - and HVAC
Business Interruption
Codec
Cold Site
Investigation
32. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Off-Site Storage
Data Marts
Keystroke Logging
IP Address Spoofing
33. A device that provides the functions of both a bridge and a router.
Criminal Law
One Time Pad
Brouter
Multi-Processor
34. The one person responsible for data - its classification and control setting
Information Owner
Overlapping Fragment Attack
Disaster Recovery Tape
EMI
35. Recovery alternative - complete duplication of services including personnel
Twisted Pair
Dictionary Attack
Cryptovariable
Mirrored Site
36. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Investigation
ITSEC
Workaround Procedures
IP Fragmentation
37. Mathematical function that determines the cryptographic operations
Algorithm
Administrative Law
Fire Classes
Proxies
38. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Custodian
Cryptography
Deleted File
Smurf
39. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Key Escrow
Call Tree
Checklist Test (desk check)
Deadlock
40. Regular operations are stopped and where processing is moved to the alternate site.
Full-Interruption test
Top Secret
Business Impact Assessment (BIA)
Virus
41. An individuals conduct that violates government laws developed to protect the public
Accurate
Hijacking
Criminal Law
Monitor
42. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Orange Book D Classification
Elements of Negligence
Computer Forensics
File Server
43. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Privacy Laws
Honeypot
Centralized Access Control Technologies
Trademark
44. To smooth out reductions or increases in power
UPS
Centralized Access Control Technologies
Quantitative Risk Analysis
Brouter
45. A backup type which creates a complete copy
Incident Response Team
Journaling
Concatenation
Replication
46. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Common Law
Information Technology Security Evaluation Criteria - ITSEC
Basics Of Secure Design
Sag/Dip
47. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Analysis
Full Test (Full Interruption)
Brownout
Incident Response
48. Interception of a communication session by an attacker.
Hijacking
Code
Cryptology
Monitor
49. Binary decision by a system of permitting or denying access to the entire system
Authentication
Enticement
Content Dependent Access Control
Exercise
50. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Enticement
Change Control
Aggregation
Key Space