SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A state for operating system tasks only
Supervisor Mode (monitor - system - privileged)
Liability
Backup
Access Control Lists
2. Information about data or records
User Mode (problem or program state)
Metadata
Replication
Moore's Law
3. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Data Owner
Data Backups
Metadata
Wait
4. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Record Level Deletion
Polymorphism
Kerberos
False Negative
5. Control category- to record an adversary's actions
Archival Data
File
Detective
Sniffing
6. A process state - to be either be unable to run waiting for an external event or terminated
Cryptography
Stopped
Operational Test
Deterrent
7. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Certificate Revocation List (CRL)
Deadlock
Reference Monitor
Custodian
8. For PKI - decertify an entities certificate
Revocation
Routers
Record Level Deletion
Business Unit Recovery
9. An image compression standard for photographs
JPEG (Joint Photographic Experts Group)
Concatenation
Policy
Operational Exercise
10. Abstract and mathematical in nature - defining all possible states - transitions and operations
State Machine Model
Data Backup Strategies
Coaxial Cable
E-Mail Spoofing
11. A collection of information designed to reduce duplication and increase integrity
Databases
Data Integrity
Payload
Risk Assessment
12. Weak evidence
Hearsay
Mirrored Site
Honeypot
Walk Though
13. Control type- that is communication based - typically written or oral
Hot Spares
Fraggle
Complete
Administrative
14. Inference about encrypted communications
Orange Book A Classification
Firmware
Side Channel Attack
Sharing
15. The partial or full duplication of data from a source database to one or more destination databases.
Cross Training
Damage Assessment
Database Replication
Analysis
16. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Notification
Recovery Period
Embedded Systems
Disaster Recovery Plan
17. Real-time data backup ( Data Mirroring)
Generator
Modems
Database Shadowing
Hot Spares
18. OOP concept of a template that consist of attributes and behaviors
Concentrator
CPU Cache
Damage Assessment
Class
19. Eavesdropping on network communications by a third party.
DR Or BC Coordinator
UPS
Near Site
Tapping
20. Granular decision by a system of permitting or denying access to a particular resource on the system
Gateway
User
Authorization
Off-Site Storage
21. Define the way in which the organization operates.
Maximum Tolerable Downtime (MTD)
Risk
Proprietary
Governance
22. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Residual Risk
Governance
Debriefing/Feedback
Plaintext
23. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. A covert storage channel on the file attribute
Distributed Processing
Fire Detection
Alternate Data Streams (File System Forks)
Resumption
25. A state where two subjects can access the same object without proper mediation
Race Condition
Non-Repudiation
Stopped
Shift Cipher (Caesar)
26. Weakness or flaw in an asset
Redundant Array Of Independent Drives (RAID)
Vulnerability
Patch Panels
Repeaters
27. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Crisis
Business Continuity Steering Committee
Switches
Disaster Recovery Tape
28. Methodical research of an incident with the purpose of finding the root cause
Investigation
Structured Walkthrough
Byte
ff Site
29. An alert or alarm that is triggered when no actual attack has taken place
Cross Certification
Classification Scheme
Eavesdropping
False (False Positive)
30. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Emergency Operations Center (EOC)
Processes are Isolated By
Hot Spares
Administrative Laws
31. Searching for wireless networks in a moving car.
ff Site
War Driving
Spam
Incident Response
32. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Administrative Access Controls
Data Custodian
Permutation /Transposition
Virtual Memory
33. Requirement to take time off
Mandatory Vacations
Full-Interruption test
Maximum Tolerable Downtime (MTD)
Surge Suppressor
34. Recovery alternative which includes cold site and some equipment and infrastructure is available
Fiber Optics
ISO/IEC 27002
Warm Site
Site Policy Awareness
35. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Concentrator
Cryptography
Electronic Vaulting
Administrative Laws
36. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Embedded Systems
Admissible
Structured Walkthrough
Compiler
37. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Trusted Computing Base
Discretionary Access Control (DAC)
Simulation Test
Data Custodian
38. Record of system activity - which provides for monitoring and detection.
Open Mail Relay Servers
Deadlock
Log
Binary
39. Location where coordination and execution of BCP or DRP is directed
Resumption
Coaxial Cable
Emergency Operations Center (EOC)
Redundant Servers
40. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Recovery Point Objective (RPO)
Remanence
Cryptology
Fault
41. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Picking
Risk Assessment / Analysis
Data Dictionary
Multiplexers
42. For PKI - to store another copy of a key
Key Escrow
Polymorphism
Boot (V.)
Business Continuity Planning (BCP)
43. Provides a physical cross connect point for devices.
Event
JPEG (Joint Photographic Experts Group)
Payload
Patch Panels
44. Encryption system using a pair of mathematically related unequal keys
Asymmetric
Generator
Data Owner
Territoriality
45. A signal suggesting a system has been or is being attacked.
Key Clustering
Fire Detection
Alert/Alarm
Brute Force
46. A group or network of honeypots
Incident
Honeynet
Activation
Packet Filtering
47. Controls for logging and alerting
Permutation /Transposition
Security Clearance
Intrusion Detection Systems
Confidence Value
48. Sudden rise in voltage in the power supply.
Surge
Codec
Redundant Servers
Hot Site
49. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Life Cycle of Evidence
Residual Data
Quantitative Risk Analysis
ISO/IEC 27002
50. Policy or stated actions
Due Care
Inference
Privacy Laws
User Mode (problem or program state)