SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Weakness or flaw in an asset
Procedure
Vulnerability
Remote Access Trojan
Collisions
2. Outputs within a given function are the same result
Collisions
Shift Cipher (Caesar)
Algorithm
Switches
3. A design methodology which executes in a linear one way fashion
Waterfall
Security Blueprint
Plaintext
Non-Interference
4. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Due Diligence
Infrastructure
Side Channel Attack
Overlapping Fragment Attack
5. Intellectual property protection for marketing efforts
SYN Flooding
Administrative Laws
Teardrop
Trademark
6. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Disaster
Fault
Accreditation
Application Programming Interface
7. Object reuse protection and auditing
Administrative Access Controls
Orange Book B1 Classification
Symmetric
Orange Book C2 Classification
8. Malware that subverts the detective controls of an operating system
Multi-Processing
Full-Interruption test
Rootkit
Polymorphism
9. OOP concept of a template that consist of attributes and behaviors
System Life Cycle
Class
Worldwide Interoperability for Microwave Access (WI-MAX )
Common Law
10. Vehicle stopping object
Bollard
Business Recovery Team
File Server
Entrapment
11. Eavesdropping on network communications by a third party.
Sniffing
Incident Handling
Resumption
Brownout
12. Sphere of influence
Interception
Code
Domain
Security Domain
13. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
ITSEC
Internal Use Only
Aggregation
Firewall
14. The partial or full duplication of data from a source database to one or more destination databases.
Locard's Principle
User Mode (problem or program state)
Brownout
Database Replication
15. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Application Programming Interface
Processes are Isolated By
Desk Check Test
Tapping
16. Recovery alternative - everything needed for the business function - except people and last backup
Hot Site
Warm Site
Access Point
Mirroring
17. Security policy - procedures - and compliance enforcement
Application Programming Interface
Certificate Revocation List (CRL)
Examples of non-technical security components
Multi-Core
18. The chance that something negative will occur
Shift Cipher (Caesar)
Hearsay
Slack Space
Risk
19. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Brouter
Key Clustering
Framework
Deleted File
20. Trading one for another
Ethics
Substitution
Tar Pits
Interpreter
21. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Data Custodian
Application Programming Interface
Archival Data
Critical Functions
22. The guardian of asset(s) - a maintenance activity
Fire Suppression
Near Site
TIFF (Tagged Image File Format)
Custodian
23. Maximum tolerance for loss of certain business function - basis of strategy
Remote Journaling
Recovery Time Objectives
Cold Site
Acronym for American Standard Code for Information Interchange (ASCII)
24. The one person responsible for data - its classification and control setting
Information Owner
Key Space
Voice Over IP (VOIP)
Conflict Of Interest
25. A device that provides the functions of both a bridge and a router.
Risk
Business Continuity Program
Brouter
Man-In-The-Middle Attack
26. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Initialization Vector
Directive
Attacker (Black hat - Hacker)
Data Backup Strategies
27. Disruption of operation of an electronic device due to a competing electromagnetic field.
Distributed Denial Of Service
EMI
Disaster
Patch Management
28. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Redundant Servers
Control Type
Source Routing Exploitation
Alert
29. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Injection
Digital Signature
Kerberos
Discretionary Access Control (DAC)
30. Potentially compromising leakage of electrical or acoustical signals.
Data Hiding
Confidence Value
Emanations
Public Key Infrastructure (PKI)
31. A backup of data located where staff can gain access immediately
Administrative Access Controls
Work Factor
Damage Assessment
On-Site
32. Regular operations are stopped and where processing is moved to the alternate site.
Information Technology Security Evaluation Criteria - ITSEC
Distributed Denial Of Service
Digital Signature
Full-Interruption test
33. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Incident
The ACID Test
Mission-Critical Application
Desk Check Test
34. Responsibility of a user for the actions taken by their account which requires unique identification
Accreditation
Liability
Accountability
Copyright
35. A control before attack
Authentication
Trade Secret
Safeguard
Degauss
36. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Hub
Strong Authentication
Critical Functions
Admissible
37. Controls for termination of attempt to access object
Contingency Plan
Architecture
Intrusion Prevention Systems
Cryptanalysis
38. Object based description of a system or a collection of resources
Kernel
Access Control Matrix
Content Dependent Access Control
Enticement
39. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Life Cycle of Evidence
Buffer Overflow
Data Recovery
Computer System Evidence
40. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Encipher
Basics Of Secure Design
Distributed Processing
Overlapping Fragment Attack
41. Moving the alphabet intact a certain number spaces
Bumping
Shift Cipher (Caesar)
One Time Pad
Hash Function
42. Forgery of the sender's email address in an email header.
Microwave
Dictionary Attack
E-Mail Spoofing
Mandatory Vacations
43. Third party processes used to organize the implementation of an architecture
Strategic
Emanations
Redundant Servers
Framework
44. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
Injection
Classification
MOM
Administrative Law
45. A hash that has been further encrypted with a symmetric algorithm
Degauss
Keyed-Hashing For Message Authentication
Patent
Tort
46. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Failure Modes and Effect Analysis (FEMA)
Confidence Value
File
Distributed Denial Of Service
47. Power surge
Least Privilege
Bumping
Procedure
Electrostatic Discharge
48. Object based description of a single resource and the permission each subject
Access Control Lists
On-Site
Incident Manager
Hijacking
49. Induces a crime - tricks a person - and is illegal
Log
Information Owner
Entrapment
Confidence Value
50. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
IP Fragmentation
Business Interruption Insurance
Residual Data
Watermarking