SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Honeypot
Byte
Non-Discretionary Access Control
Off-Site Storage
2. A copy of transaction data - designed for querying and reporting
Admissible
Key Management
Fire Prevention
Data Warehouse
3. Those who initiate the attack
Emergency Operations Center (EOC)
Threat Agent
Brute Force
Debriefing/Feedback
4. A shield against leakage of electromagnetic signals.
Faraday Cage/ Shield
Detection
Picking
Journaling
5. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Information Owner
Active Data
Multilevel Security System
Access Point
6. Low level - pertaining to planning
Surge Suppressor
Tapping
Spiral
Tactical
7. A telephone exchange for a specific office or business.
Private Branch Exchange (PBX)
Database Shadowing
Workaround Procedures
Sniffing
8. One way encryption
Information Owner
Permutation /Transposition
Electromagnetic Interference (EMI)
Hash Function
9. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Byte Level Deletion
Malformed Input
Method
Privacy Laws
10. Dedicated fast memory located on the same board as the CPU
Virtual Memory
Attacker (Black hat - Hacker)
Due Diligence
CPU Cache
11. A layer 2 device that used to connect two or more network segments and regulate traffic.
Switches
Tactical
Certification Authority
False Negative
12. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Asymmetric
Embedded Systems
Initialization Vector
ISO/IEC 27001
13. A protocol for the efficient transmission of voice over the Internet
SQL Injection
Access Control Lists
Voice Over IP (VOIP)
Algorithm
14. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Security Kernel
Technical Access Controls
Procedure
Non-Interference
15. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Control Type
Information Owner
Checklist Test
Data Backups
16. Recovery alternative - short-term - high cost movable processing location
Vulnerability
Mobile Site
Capability Tables
Event
17. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Inheritance
Non-Discretionary Access Control
Administrative Laws
Event
18. A database backup type which records at the transaction level
Disaster Recovery Plan
Tar Pits
Spiral
Remote Journaling
19. A electronic attestation of identity by a certificate authority
Computer System Evidence
2-Phase Commit
Information Flow Model
Digital Certificate
20. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Patch Panels
Key Escrow
Interpreter
Orange Book B2 Classification
21. Two different keys decrypt the same cipher text
Key Clustering
Trade Secret
Site Policy
Mixed Law System
22. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Alert/Alarm
Data Owner
Accreditation
Hearsay Evidence
23. A control after attack
Collisions
Countermeasure
Fire Detection
War Driving
24. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Business Interruption Insurance
Cookie
Cross Training
Tar Pits
25. Specific format of technical and physical controls that support the chosen framework and the architecture
Infrastructure
Governance
Criminal Law
Change Control
26. Review of data
Application Programming Interface
Analysis
Gateway
Operating
27. A trusted issuer of digital certificates
File Sharing
Civil Law
Alarm Filtering
Certification Authority
28. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Radio Frequency Interference (RFI)
Off-Site Storage
HTTP Response Splitting
Business Interruption Insurance
29. Unchecked data which spills into another location in memory
Cross Training
Decipher
Data Diddler
Buffer Overflow
30. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Information Technology Security Evaluation Criteria - ITSEC
Certificate Revocation List (CRL)
Pervasive Computing and Mobile Computing Devices
Coaxial Cable
31. A type of multitasking that allows for more even distribution of computing time among competing request
Central Processing Unit (CPU)
Firmware
Boot (V.)
Preemptive
32. The event signaling an IDS to produce an alarm when no attack has taken place
Non-Interference
Key Space
Intrusion Prevention Systems
False Attack Stimulus
33. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Infrastructure
Crisis
Information Technology Security Evaluation Criteria - ITSEC
Virtual Memory
34. Collection of data on business functions which determines the strategy of resiliency
False Negative
Business Impact Assessment (BIA)
Mitigate
Malformed Input
35. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Mirroring
Disaster Recovery Plan
Prevention
Stopped
36. Physical description on the exterior of an object that communicates the existence of a label
Conflict Of Interest
Total Risk
Layering
Marking
37. Less granular organization of controls -
Capability Tables
Certification Authority
Control Type
Total Risk
38. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Degauss
Business Interruption Insurance
The ACID Test
Atomicity
39. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Reference Monitor
On-Site
Directive
Threats
40. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Disaster Recovery Plan
Uninterruptible Power Supply (UPS)
Kerckhoff's Principle
Multi-Programming
41. More than one CPU on a single board
Object
Brute Force
Spyware
Multi-Core
42. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
ITSEC
Patent
Hacker
Active Data
43. Malware that makes small random changes to many data points
Operational Test
File Level Deletion
Data Diddler
Honeypot
44. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Workaround Procedures
Business Impact Analysis
Vital Record
Electronic Vaulting
45. Code breaking - practice of defeating the protective properties of cryptography.
Uninterruptible Power Supply (UPS)
Cryptanalysis
Work Factor
Information Owner
46. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Governance
One Time Pad
Copyright
Public Key Infrastructure (PKI)
47. False memory reference
Dangling Pointer
Incident Manager
Memory Management
IP Fragmentation
48. Measures followed to restore critical functions following a security incident.
Operational Exercise
Recovery
Surge Suppressor
Policy
49. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Admissible
Kerberos
Virus
Salami
50. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
BCP Testing Drills and Exercises
Control Type
SQL Injection
Object Reuse