SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Object reuse protection and auditing
Security Domain
Orange Book C2 Classification
Access Point
Labeling
2. Eavesdropping on network communications by a third party.
Asymmetric
Examples of technical security components
Tapping
Keyed-Hashing For Message Authentication
3. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Fire Classes
Threats
Tracking
Strategic
4. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Blind Testing
Dangling Pointer
Total Risk
Disaster Recovery Plan
5. To break a business process into separate functions and assign to different people
Orange Book C2 Classification
Sequence Attacks
Rollback
Separation Of Duties
6. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Declaration
Waterfall
Instance
Off-Site Storage
7. A database backup type which records at the transaction level
Cross Certification
Bollard
Checkpoint
Remote Journaling
8. Highest level of authority at EOC with knowledge of the business process and the resources available
Conflict Of Interest
Redundant Servers
Security Domain
Incident Manager
9. Effort/time needed to overcome a protective measure
Routers
TNI (Red Book)
Strategic
Work Factor
10. To move from location to location - keeping the same function
Job Rotation
Redundant Servers
Qualitative
Civil Law
11. A software design technique for abstraction of a process
Data Hiding
Cryptology
Strategic
Disaster Recovery Teams (Business Recovery Teams)
12. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Vulnerability
Multi-Party Control
Worldwide Interoperability for Microwave Access (WI-MAX )
Rollback
13. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Log
Rootkit
Smurf
Metadata
14. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Operational Impact Analysis
Tapping
Encipher
Uninterruptible Power Supply (UPS)
15. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Recovery
Message Digest
ff Site
Detection
16. Unsolicited advertising software
Primary Storage
Cryptology
Adware
Monitor
17. Asymmetric encryption of a hash of message
Total Risk
Embedded
Digital Signature
Acronym for American Standard Code for Information Interchange (ASCII)
18. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Firewall
Revocation
Access Control Lists
Proxies
19. A type of attack involving attempted insertion - deletion or altering of data.
Prevention
Bridge
Procedure
Modification
20. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Alert
User Mode (problem or program state)
CobiT
Business Recovery Team
21. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Modification
Running
Electronic Vaulting
Cross Certification
22. Is secondhand and usually not admissible in court
Business Records
Activation
Hearsay Evidence
Digital Signature
23. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Classification
Multilevel Security System
Non-Repudiation
Alarm Filtering
24. Initial surge of current
Fragmented Data
Brute Force
Symmetric
Inrush Current
25. Hiding the fact that communication has occurred
ITSEC
Mobile Recovery
Steganography
Trusted Computing Base
26. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Compensating
Evidence
Chain of Custody
Multi-Tasking
27. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Incident Manager
Patch Panels
Simulation Test
Layering
28. A process state - to be executing a process on the CPU
Running
Birthday Attack
Disk Mirroring
Man-In-The-Middle Attack
29. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Packet Filtering
Hot Spares
Deadlock
Test Plan
30. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Administrative
Forward Recovery
Embedded
EMI
31. System mediation of access with the focus on the context of the request
Cryptology
Workaround Procedures
Compartmentalize
Content Dependent Access Control
32. Small data files written to a user's hard drive by a web server.
Strategic
Brute Force
Threats
Cookie
33. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Concentrator
Non-Discretionary Access Control
Hub
Triage
34. Security policy - procedures - and compliance enforcement
Redundant Servers
Binary
Processes are Isolated By
Examples of non-technical security components
35. OOP concept of a distinct copy of the class
Pointer
Information Risk Management (IRM)
Data Backups
Object
36. Induces a crime - tricks a person - and is illegal
Entrapment
Basics Of Secure Design
Identification
Control Type
37. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Burn
Reciprocal Agreement
Firewall
Injection
38. Firewalls - encryption - and access control lists
Examples of technical security components
Territoriality
Class
Record Level Deletion
39. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Cache
Honeynet
Masquerading
Computer System Evidence
40. Uncheck data input which results in redirection
Preemptive
Electronic Vaulting
Data Warehouse
HTTP Response Splitting
41. Of a system without prior knowledge by the tester or the tested
Data Backup Strategies
Double Blind Testing
Checksum
Exercise
42. Information about data or records
Metadata
Trade Secret
Adware
User Mode (problem or program state)
43. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Desk Check Test
Redundant Servers
Qualitative
Emergency Procedures
44. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Disaster Recovery Plan
Executive Succession
Business Unit Recovery
Job Rotation
45. Deals with discretionary protection
Orange Book C Classification
Malformed Input
Salami
On-Site
46. An image compression standard for photographs
JPEG (Joint Photographic Experts Group)
Technical Access Controls
Firewalls
TEMPEST
47. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Confidence Value
Compiler
Denial Of Service
Chain Of Custody
48. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
EMI
Double Blind Testing
Surge
Quantitative Risk Analysis
49. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
HTTP Response Splitting
Detective
Multi-Programming
Call Tree
50. A template for the designing the architecture
Near Site
Non-Interference
Digital Signature
Security Blueprint