SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Intermediate level - pertaining to planning
Operational
Crisis
IP Address Spoofing
Active Data
2. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Emergency Procedures
Bumping
Attacker (Black hat - Hacker)
JPEG (Joint Photographic Experts Group)
3. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
ISO/IEC 27001
Fragmented Data
Risk Mitigation
High-Risk Areas
4. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Near Site
Physical Tampering
Operating
Checklist Test
5. Vehicle or tool that exploits a weakness
Threats
Top Secret
TNI (Red Book)
Job Training
6. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Vulnerability
Fire Suppression
Business Records
System Life Cycle
7. All of the protection mechanism in a computer system
Trusted Computing Base
Databases
Distributed Processing
Operational Exercise
8. Location to perform the business function
Rollback
Residual Data
Alternate Site
Spyware
9. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Certification Authority
Job Training
Site Policy Awareness
Critical Functions
10. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Worldwide Interoperability for Microwave Access (WI-MAX )
Encryption
Walk Though
Source Routing Exploitation
11. Total number of keys available that may be selected by the user of a cryptosystem
Orange Book A Classification
Object Oriented Programming (OOP)
Authentic
Key Space
12. Less granular organization of controls -
Control Type
Non-Interference
Physical Tampering
Incident Response Team
13. Methodical research of an incident with the purpose of finding the root cause
Tracking
Investigation
Bridge
Pointer
14. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Sharing
Cipher Text
Malformed Input
Application Programming Interface
15. State of computer - to be running a process
Operating
False (False Positive)
Object Reuse
Polyalphabetic
16. Identification and notification of an unauthorized and/or undesired action
Alarm Filtering
Hash Function
Detection
Source Routing Exploitation
17. A failure of an IDS to detect an actual attack
False Negative
Checklist Test
Separation Of Duties
Chain of Custody
18. Memory management technique that allows two processes to run concurrently without interaction
Protection
Containment
Shielding
Business Recovery Timeline
19. To stop damage from spreading
Containment
3 Types of harm Addressed in computer crime laws
Operational
Recovery
20. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Firmware
Near Site
Alert
Rollback
21. Forgery of the sender's email address in an email header.
Job Rotation
Tapping
Classification
E-Mail Spoofing
22. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Redundant Servers
Cross-Site Scripting
Code
Metadata
23. Intellectual property protection for an invention
Access Control Lists
Patent
Spyware
Collisions
24. Malware that subverts the detective controls of an operating system
Encapsulation
Open Mail Relay Servers
Accountability
Rootkit
25. Short period of low voltage.
Risk Mitigation
Deterrent
Sag/Dip
User
26. A process state - to be either be unable to run waiting for an external event or terminated
Plaintext
Cryptovariable
False Attack Stimulus
Stopped
27. Memory management technique which allows data to be moved from one memory address to another
Business Recovery Timeline
State Machine Model
Record Level Deletion
Relocation
28. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. The problems solving state - the opposite of supervisor mode
Warm Site
Race Condition
User Mode (problem or program state)
Honeynet
30. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Data Backup Strategies
Threats
Running Key
Mission-Critical Application
31. A backup type - for databases at a point in time
Brouter
Incident Manager
Shadowing (file shadowing)
Site Policy
32. Regular operations are stopped and where processing is moved to the alternate site.
Operational
Forensic Copy
Critical Records
Full-Interruption test
33. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Discretionary Access Control (DAC)
Satellite
Disaster Recovery Teams (Business Recovery Teams)
Vulnerability
34. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Business Continuity Steering Committee
File Shadowing
Exercise
Access Control Matrix
35. An unintended communication path
Disaster Recovery Tape
File Extension
Covert Channel
Cache
36. Real-time - automatic and transparent backup of data.
Remote Journaling
File Server
Fiber Optics
Change Control
37. Unauthorized access of network devices.
Picking
MOM
Bridge
Physical Tampering
38. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Recovery Strategy
Chain of Custody
Information Owner
Worldwide Interoperability for Microwave Access (WI-MAX )
39. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Tar Pits
Deletion
Internal Use Only
Multi-Programming
40. Asymmetric encryption of a hash of message
Digital Signature
Multilevel Security System
Wait
Bridge
41. Recording activities at the keyboard level
Keystroke Logging
Ring Protection
Firewall
Risk Assessment
42. An attack involving the hijacking of a TCP session by predicting a sequence number.
Business Impact Analysis
Masquerading
Sequence Attacks
Business Recovery Team
43. A Trojan horse with the express underlying purpose of controlling host from a distance
Remote Access Trojan
Journaling
Deterrent
Disaster Recovery Teams (Business Recovery Teams)
44. Unsolicited advertising software
Examples of technical security components
CPU Cache
Polymorphism
Adware
45. Return to a normal state
Consistency
Life Cycle of Evidence
Non-Interference
Recovery
46. OOP concept of a template that consist of attributes and behaviors
Classification
Replication
Domain
Class
47. Subjects will not interact with each other's objects
Mobile Recovery
Multiplexers
Non-Interference
Binary
48. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Data Custodian
Multi-Programming
Activation
Business Unit Recovery
49. A secure connection to another network.
Orange Book D Classification
Durability
Education
Gateway
50. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Sharing
Authentication
Distributed Denial Of Service
Open Mail Relay Servers