SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The connection between a wireless and wired network.
Blackout
Disaster Recovery Teams (Business Recovery Teams)
Access Point
Trojan Horse
2. For PKI - to have more than one person in charge of a sensitive function
Multi-Party Control
Technical Access Controls
Modems
Business Interruption
3. Property that data is represented in the same manner at all times
Consistency
Redundant Servers
Denial Of Service
Packet Filtering
4. Try a list of words in passwords or encryption keys
Reciprocal Agreement
Cryptography
One Time Pad
Dictionary Attack
5. Physical description on the exterior of an object that communicates the existence of a label
Forward Recovery
Digital Signature
Marking
Prevention
6. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
DR Or BC Coordinator
Strategic
Smurf
Network Attached Storage (NAS)
7. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Primary Storage
Worm
Recovery Period
Business Recovery Timeline
8. Recognition of an individual's assertion of identity.
Mandatory Access Control (MAC)
Intrusion Detection Systems
Incident Manager
Identification
9. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Resumption
Metadata
Tactical
Information Risk Management (IRM)
10. Summary of a communication for the purpose of integrity
Message Digest
Polymorphism
Guidelines
Examples of technical security components
11. Maintenance procedures outline the process for the review and update of business continuity plans.
Isolation
Plan Maintenance Procedures
Backup
Hub
12. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Encipher
Orange Book D Classification
Object Reuse
Embedded
13. The level and label given to an individual for the purpose of compartmentalization
Security Clearance
Backup
Digital Signature
Tactical
14. The collection and summation of risk data relating to a particular asset and controls for that asset
Emergency Procedures
Parallel Test
Risk Assessment
JPEG (Joint Photographic Experts Group)
15. Real-time data backup ( Data Mirroring)
Database Shadowing
Basics Of Secure Design
Executive Succession
Residual Data
16. Potentially compromising leakage of electrical or acoustical signals.
On-Site
Multilevel Security System
Emanations
Trojan Horse
17. Memory management technique which allows subjects to use the same resource
Data Recovery
Sharing
Locard's Principle
User Mode (problem or program state)
18. Controls for logging and alerting
Security Blueprint
Microwave
Intrusion Detection Systems
Redundant Servers
19. A database that contains the name - type - range of values - source and authorization for access for each data element
Brownout
Executive Succession
Data Dictionary
Surge Suppressor
20. An encryption method that has a key as long as the message
Running Key
Multi-Processing
Test Plan
Authentic
21. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Orange Book A Classification
Side Channel Attack
Inference
Exercise
22. A device that sequentially switches multiple analog inputs to the output.
Event
Waterfall
Routers
Multiplexers
23. A shield against leakage of electromagnetic signals.
Uninterruptible Power Supply (UPS)
Enticement
On-Site
Faraday Cage/ Shield
24. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Proxies
Assembler
Critical Records
Workaround Procedures
25. Quantity of risk remaining after a control is applied
Residual Risk
Electrostatic Discharge
Surge Suppressor
Hijacking
26. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Service Bureau
Top Secret
Disaster Recovery Tape
Deadlock
27. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Symmetric
Cryptanalysis
Notification
Pointer
28. Memory management technique which allows data to be moved from one memory address to another
Relocation
Burn
File Shadowing
Fire Detection
29. Outputs within a given function are the same result
Electronic Vaulting
Administrative Law
Collisions
Computer System Evidence
30. Evidence must be: admissible - authentic - complete - accurate - and convincing
5 Rules Of Evidence
Civil Law
Primary Storage
Application Programming Interface
31. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
Desk Check Test
Honeypot
Custodian
Operational Exercise
32. Return to a normal state
Recovery
Classification
Data Marts
Discretionary
33. Written core statements that rarely change
Archival Data
Policy
Orange Book C2 Classification
TEMPEST
34. Controls for termination of attempt to access object
Non-Discretionary Access Control
Hearsay Evidence
Intrusion Prevention Systems
Honeynet
35. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Business Continuity Program
Faraday Cage/ Shield
Mandatory Access Control (MAC)
Need-To-Know
36. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Sag/Dip
Forensic Copy
Computer System Evidence
Protection
37. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Encapsulation
Multiplexers
Access Control Lists
Recovery Time Objectives
38. Of a system without prior knowledge by the tester or the tested
Access Control Attacks
Slack Space
Double Blind Testing
Bollard
39. System of law based upon what is good for society
War Driving
Hot Site
Data Dictionary
Civil Or Code Law
40. To evaluate the current situation and make basic decisions as to what to do
Full-Interruption test
Proxies
Triage
Checklist Test (desk check)
41. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Critical Records
Top Secret
Key Clustering
MOM
42. The technical and risk assesment of a system within the context of the operating environment
Business Interruption
Certification
Accountability
Database Replication
43. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Redundant Array Of Independent Drives (RAID)
Civil Law
Supervisor Mode (monitor - system - privileged)
Marking
44. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Restoration
Detective
Elements of Negligence
Residual Risk
45. Pertaining to law - verified as real
Remote Journaling
Rogue Access Points
Authentic
Switches
46. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Territoriality
Recovery Strategy
Triage
Tracking
47. Independent malware that requires user interaction to execute
Alarm Filtering
2-Phase Commit
Virus
Remote Access Trojan
48. Something that happened
Substitution
Total Risk
Event
Exposure
49. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Inheritance
Tort
File Level Deletion
Transfer
50. Record history of incident
Contingency Plan
Data Backups
Tracking
Emanations