SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Object
Top Secret
Voice Over IP (VOIP)
Fragmented Data
2. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Centralized Access Control Technologies
Blind Testing
Highly Confidential
Business Records
3. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Control Type
Checkpoint
Due Diligence
Data Backup Strategies
4. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Site Policy Awareness
Detective
Cryptography
Memory Management
5. Identification and notification of an unauthorized and/or undesired action
Trademark
Concatenation
Wait
Detection
6. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Microwave
Full Test (Full Interruption)
Containment
False Negative
7. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
System Downtime
Double Blind Testing
Distributed Denial Of Service
Proxies
8. Renders the record inaccessible to the database management system
Standalone Test
Record Level Deletion
Deadlock
Data Custodian
9. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Active Data
User
Pervasive Computing and Mobile Computing Devices
Concatenation
10. An event which stops business from continuing.
Disaster
Generator
Sag/Dip
Radio Frequency Interference (RFI)
11. Inference about encrypted communications
Mobile Site
Microwave
Custodian
Side Channel Attack
12. Two different keys decrypt the same cipher text
Accreditation
Key Clustering
Cryptanalysis
Multi-Processing
13. Employment education done once per position or at significant change of function
Packet Filtering
Job Training
Business Continuity Planning (BCP)
Failure Modes and Effect Analysis (FEMA)
14. Unsolicited advertising software
Exposure
IDS Intrusion Detection System
Adware
E-Mail Spoofing
15. A process state - to be either be unable to run waiting for an external event or terminated
Stopped
Revocation
Isolation
Moore's Law
16. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
ISO/IEC 27002
Elements of Negligence
Dangling Pointer
Remote Access Trojan
17. Forgery of the sender's email address in an email header.
Hard Disk
E-Mail Spoofing
Botnet
Interception
18. To set the clearance of a subject or the classification of an object
Emergency Procedures
Due Care
Labeling
Interpreter
19. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Kerberos
Surge
Mitigate
Inheritance
20. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Discretionary Access Control (DAC)
Common Law
Authentic
Simulation
21. A collection of information designed to reduce duplication and increase integrity
Slack Space
Hacker
Labeling
Databases
22. Converts source code to an executable
Hijacking
Checkpoint
Compiler
Simulation
23. Eavesdropping on network communications by a third party.
Tapping
Distributed Denial Of Service
Access Control Lists
Prevention
24. Responsibility for actions
IDS Intrusion Detection System
Liability
Incident Response
Electronic Vaulting
25. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. A control before attack
Security Domain
Mixed Law System
Safeguard
Identification
27. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Method
Source Routing Exploitation
Wireless Fidelity (Wi-Fi )
Compensating
28. Someone who want to know how something works - typically by taking it apart
One Time Pad
Checkpoint
Hacker
True Attack Stimulus
29. To start business continuity processes
File Level Deletion
Activation
Wireless Fidelity (Wi-Fi )
ITSEC
30. Information about a particular data set
Metadata
Data Backups
Activation
Brouter
31. A description of a database
Chain of Custody
Data Dictionary
Payload
Computer System Evidence
32. Controls for logging and alerting
Intrusion Detection Systems
Common Law
Memory Management
Mobile Recovery
33. Location where coordination and execution of BCP or DRP is directed
Memory Management
IP Fragmentation
Cache
Emergency Operations Center (EOC)
34. Physical description on the exterior of an object that communicates the existence of a label
Object Reuse
Identification
Threat Agent
Marking
35. Natural or human-readable form of message
ITSEC
Plain Text
Patent
Structured Walk-Through Test
36. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Workaround Procedures
Plain Text
Site Policy Awareness
File Level Deletion
37. Abstract and mathematical in nature - defining all possible states - transitions and operations
Ethics
State Machine Model
Modification
Electronic Vaulting
38. To know more than one job
Discretionary
Framework
Information Risk Management (IRM)
Cross Training
39. One entity with two competing allegiances
Conflict Of Interest
Object Reuse
Digital Signature
Proxies
40. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Virtual Memory
IP Fragmentation
Cryptography
Hot Site
41. Moving letters around
Permutation /Transposition
Operational Impact Analysis
Directive
DR Or BC Coordinator
42. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Examples of technical security components
Vulnerability
Residual Risk
Twisted Pair
43. A layer 2 device that used to connect two or more network segments and regulate traffic.
Honeypot
Technical Access Controls
Threat Agent
Switches
44. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
True Attack Stimulus
Interpreter
Preemptive
Firewall
45. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Smurf
Walk Though
Fire Suppression
Access Control Lists
46. Most granular organization of controls
Control Category
Containment
Labeling
Class
47. Unused storage capacity
Hijacking
Spyware
Slack Space
Patch Panels
48. A layer 3 device that used to connect two or more network segments and regulate traffic.
Desk Check Test
True Attack Stimulus
Digital Certificate
Routers
49. An asymmetric cryptography mechanism that provides authentication.
Hijacking
Risk Assessment / Analysis
Picking
Digital Signature
50. Third party processes used to organize the implementation of an architecture
Deletion
Framework
Countermeasure
Man-In-The-Middle Attack