SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recording activities at the keyboard level
Multi-Party Control
Keystroke Logging
Due Care
Notification
2. Collection of data on business functions which determines the strategy of resiliency
Business Impact Assessment (BIA)
Public Key Infrastructure (PKI)
Administrative Laws
Authorization
3. Dedicated fast memory located on the same board as the CPU
Bridge
CPU Cache
Databases
Moore's Law
4. A device that provides the functions of both a bridge and a router.
Bit
Moore's Law
Alert
Brouter
5. Recovery alternative - complete duplication of services including personnel
Layering
Incident Handling
Mirrored Site
Certification
6. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Non-Interference
Message Digest
Pervasive Computing and Mobile Computing Devices
Contingency Plan
7. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Orange Book D Classification
Voice Over IP (VOIP)
Physical Tampering
Simulation
8. Renders the record inaccessible to the database management system
Tracking
Data Dictionary
Record Level Deletion
Checksum
9. For PKI - to store another copy of a key
Data Diddler
Sag/Dip
Certification Authority
Key Escrow
10. Business and technical process of applying security software updates in a regulated periodic way
Deadlock
Burn
Patch Management
Checklist Test
11. Natural occurrence in circuits that are in close proximity
Interference (Noise)
Voice Over IP (VOIP)
Machine Language (Machine Code)
Criminal Law
12. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Algorithm
Incident Response Team
Off-Site Storage
Mandatory
13. Scrambled form of the message or data
Disaster
Examples of non-technical security components
Kerberos
Cipher Text
14. Short period of low voltage.
Administrative Law
Sag/Dip
Cross Certification
Architecture
15. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Plaintext
Fault Tolerance
Remote Journaling
File Extension
16. A hash that has been further encrypted with a symmetric algorithm
Initialization Vector
Keyed-Hashing For Message Authentication
Patch Panels
Computer Forensics
17. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Data Hiding
Quantitative Risk Analysis
Computer Forensics
Data Leakage
18. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Workaround Procedures
Log
Life Cycle of Evidence
Multi-Programming
19. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Elements of Negligence
War Dialing
Databases
Common Criteria
20. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Restoration
Discretionary
Side Channel Attack
BCP Testing Drills and Exercises
21. Indivisible - data field must contain only one value that either all transactions take place or none do
Cross-Site Scripting
Business Records
Administrative
Atomicity
22. Lower frequency noise
Radio Frequency Interference (RFI)
Trade Secret
Access Control Matrix
Non-Interference
23. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Exercise
Cryptovariable
Hot Site
Data Dictionary
24. A back up type - where the organization has excess capacity in another location.
Distributed Processing
Mitigate
Degauss
Remote Journaling
25. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Class
Due Care
Preemptive
Incident Response Team
26. Line noise that is superimposed on the supply circuit.
Transients
Recovery Time Objectives
Compensating
Residual Risk
27. Wrong against society
Aggregation
Smurf
Criminal Law
Burn
28. Prolonged loss of commercial power
Data Custodian
Blackout
Cache
Tapping
29. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
Business Unit Recovery
System Downtime
SQL Injection
Full-Interruption test
30. Transaction controls for a database - a return to a previous state
Common Criteria
Class
Convincing
Rollback
31. DoS - Spoofing - dictionary - brute force - wardialing
Switches
Access Control Attacks
Birthday Attack
Brute Force
32. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Change Control
Locard's Principle
Journaling
Active Data
33. Using small special tools all tumblers of the lock are aligned - opening the door
Hearsay Evidence
Disaster
Risk
Picking
34. A layer 2 device that used to connect two or more network segments and regulate traffic.
Switches
Business Interruption
Failure Modes and Effect Analysis (FEMA)
Disaster Recovery Plan
35. One entity with two competing allegiances
Distributed Processing
Conflict Of Interest
2-Phase Commit
Radio Frequency Interference (RFI)
36. System directed mediation of access with labels
Civil Or Code Law
Denial Of Service
Full Test (Full Interruption)
Mandatory
37. Another subject cannot see an ongoing or pending update until it is complete
Tapping
Isolation
Blackout
Mobile Site
38. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.
Full-Interruption test
Risk Mitigation
Proprietary
Incident Response Team
39. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Mixed Law System
Computer System Evidence
Quantitative Risk Analysis
Disaster Recovery Plan
40. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Cross-Site Scripting
Spyware
Legacy Data
TCSEC (Orange Book)
41. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Mandatory Access Control (MAC)
False Negative
State Machine Model
Disk Mirroring
42. Eavesdropping on network communications by a third party.
Mandatory Access Control (MAC)
Contingency Plan
Sniffing
Alternate Data Streams (File System Forks)
43. A one way - directed graph which indicates confidentiality or integrity flow
Steganography
Structured Walkthrough
Lattice
Near Site
44. Identification and notification of an unauthorized and/or undesired action
Discretionary Access Control (DAC)
Revocation
Instance
Detection
45. Intellectual property protection for an invention
Public Key Infrastructure (PKI)
Patent
Denial Of Service
Declaration
46. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Surge Suppressor
Codec
Contact List
Investigation
47. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
3 Types of harm Addressed in computer crime laws
Reciprocal Agreement
Common Law
Data Leakage
48. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Kerberos
Database Shadowing
Trapdoors (Backdoors) (Maintenance Hooks)
Containment
49. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Risk Assessment
Event
TCSEC (Orange Book)
Degauss
50. Creation distribution update and deletion
Method
Key Management
CPU Cache
Machine Language (Machine Code)