SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Mantrap (Double Door System)
Structured Walkthrough
Failure Modes and Effect Analysis (FEMA)
Top Secret
2. To set the clearance of a subject or the classification of an object
Man-In-The-Middle Attack
Twisted Pair
Labeling
Access Point
3. Controls for termination of attempt to access object
Intrusion Prevention Systems
Strategic
Service Bureau
Critical Functions
4. Provides a physical cross connect point for devices.
Control Type
Fire Prevention
Patch Panels
Data Hiding
5. Process of statistically testing a data set for the likelihood of relevant information.
Binary
Moore's Law
Sampling
Content Dependent Access Control
6. A copy of transaction data - designed for querying and reporting
Hot Site
Network Attached Storage (NAS)
Processes are Isolated By
Data Warehouse
7. Control category- to give instructions or inform
Restoration
Directive
Worm
Archival Data
8. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Wireless Fidelity (Wi-Fi )
Remote Journaling
Compiler
The ACID Test
9. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Walk Though
Computer Forensics
Residual Risk
Highly Confidential
10. The connection between a wireless and wired network.
Maximum Tolerable Downtime (MTD)
Access Point
Machine Language (Machine Code)
Mandatory Vacations
11. A telephone exchange for a specific office or business.
Private Branch Exchange (PBX)
Civil Law
War Dialing
Denial Of Service
12. RADIUS - TACACS+ - Diameter
Centralized Access Control Technologies
Containment
Disaster
Rootkit
13. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Incident Response
Multiplexers
Business Unit Recovery
Privacy Laws
14. Claiming another's identity at a physical level
Masquerading
Attacker (Black hat - Hacker)
Aggregation
Lattice
15. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Initialization Vector
Switches
Hacker
Object Reuse
16. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
TIFF (Tagged Image File Format)
Complete
Structured Walkthrough
Digital Signature
17. OOP concept of a taking attributes from the original or parent
Conflict Of Interest
Inheritance
Orange Book B1 Classification
Disaster Recovery Tape
18. Pertaining to law - lending it self to one side of an argument
Convincing
Business Continuity Program
Honeypot
Denial Of Service
19. Memory management technique which allows data to be moved from one memory address to another
Relocation
Fiber Optics
Security Blueprint
Layering
20. Eavesdropping on network communications by a third party.
Compensating
Tapping
Memory Management
Deadlock
21. Key
Slack Space
Cryptovariable
Wireless Fidelity (Wi-Fi )
Alternate Data Streams (File System Forks)
22. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Certification
Payload
Disaster Recovery Tape
Orange Book B2 Classification
23. A form of data hiding which protects running threads of execution from using each other's memory
Restoration
Process Isolation
BCP Testing Drills and Exercises
Blackout
24. One entity with two competing allegiances
Conflict Of Interest
Maximum Tolerable Downtime (MTD)
Triage
Tapping
25. A hash that has been further encrypted with a symmetric algorithm
War Dialing
Mandatory
Access Point
Keyed-Hashing For Message Authentication
26. The core of a computer that calculates
Targeted Testing
Central Processing Unit (CPU)
Architecture
Botnet
27. Intellectual property protection for marketing efforts
Pointer
Trademark
Trojan Horse
Kernel
28. The managerial approval to operate a system based upon knowledge of risk to operate
Gateway
Executive Succession
Integrated Test
Accreditation
29. A type a computer memory that temporarily stores frequently used information for quick access.
Cache
IDS Intrusion Detection System
Declaration
Fiber Optics
30. Control type- that is communication based - typically written or oral
Common Criteria
Administrative
Recovery Strategy
Shielding
31. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Job Training
Highly Confidential
Acronym for American Standard Code for Information Interchange (ASCII)
BCP Testing Drills and Exercises
32. Measures followed to restore critical functions following a security incident.
Radio Frequency Interference (RFI)
Mantrap (Double Door System)
Recovery
Accreditation
33. Mitigate damage by isolating compromised systems from the network.
Polymorphism
Ring Protection
Containment
Data Dictionary
34. Impossibility of denying authenticity and identity
Accreditation
High-Risk Areas
File Extension
Non-Repudiation
35. To assert or claim credentialing to an authentication system
Identification
Business Continuity Program
Change Control
Bridge
36. Object based description of a system or a collection of resources
Vulnerability
Access Control Matrix
Certification
Infrastructure
37. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Work Factor
TCSEC (Orange Book)
Phishing
Classification Scheme
38. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
File Extension
High-Risk Areas
Boot (V.)
Disaster Recovery Tape
39. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Covert Channel
Recovery Strategy
Classification
SYN Flooding
40. Narrow scope examination of a system
3 Types of harm Addressed in computer crime laws
Targeted Testing
Disaster Recovery Plan
Slack Space
41. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Remote Journaling
Reciprocal Agreement
Phishing
File Server
42. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Active Data
Modems
System Downtime
Bit
43. More than one process in the middle of executing at a time
Containment
Cryptovariable
Multi-Tasking
Trade Secret
44. A system that enforces an access control policy between two networks.
Firewalls
Data Recovery
Emergency
Codec
45. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Business Recovery Timeline
Mandatory
Coaxial Cable
Multi-Processor
46. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Recovery Time Objectives
Integrated Test
Pervasive Computing and Mobile Computing Devices
Microwave
47. Communication of a security incident to stakeholders and data owners.
Life Cycle of Evidence
Notification
Worm
Critical Functions
48. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Business Impact Assessment (BIA)
Shift Cipher (Caesar)
Boot (V.)
Tort
49. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Administrative Access Controls
Non-Discretionary Access Control
CPU Cache
Recovery
50. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Storage Area Network (SAN)
Mock Disaster
Double Blind Testing
Threads