SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Kerckhoff's Principle
Trojan Horse
Business Unit Recovery
Mock Disaster
2. A mobilized resource purchased or contracted for the purpose of business recovery.
Authorization
Residual Data
Disaster
Mobile Recovery
3. A database that contains the name - type - range of values - source and authorization for access for each data element
Degauss
Data Dictionary
Honeypot
Orange Book C2 Classification
4. Responsibility for actions
Liability
Cryptanalysis
Emergency Procedures
Symmetric
5. A temporary public file to inform others of a compromised digital certificate
Concatenation
Alternate Data Streams (File System Forks)
Certificate Revocation List (CRL)
Atomicity
6. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Notification
Computer Forensics
Patch Management
Ring Protection
7. System mediation of access with the focus on the context of the request
Assembler
Data Marts
Content Dependent Access Control
Cryptanalysis
8. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
TIFF (Tagged Image File Format)
Man-In-The-Middle Attack
Record Level Deletion
Discretionary
9. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Checklist Test (desk check)
Life Cycle of Evidence
Business Recovery Team
Permutation /Transposition
10. Pertaining to law - lending it self to one side of an argument
Storage Area Network (SAN)
Non-Discretionary Access Control
Disaster
Convincing
11. A device that converts between digital and analog representation of data.
Pervasive Computing and Mobile Computing Devices
Due Diligence
Modems
Non-Repudiation
12. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Blackout
Byte Level Deletion
Domain
Corrective
13. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Symmetric
Business Continuity Planning (BCP)
Relocation
Compression
14. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Network Attached Storage (NAS)
Kerckhoff's Principle
Log
Hearsay
15. Organized group of compromised computers
Mirroring
ITSEC
Enticement
Botnet
16. Unsolicited advertising software
Permutation /Transposition
Adware
Checklist Test (desk check)
Sampling
17. Controls for logging and alerting
Brownout
Intrusion Detection Systems
Access Control
Fault
18. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Multi-Programming
Least Privilege
Covert Channel
Uninterruptible Power Supply (UPS)
19. Key
Bridge
Satellite
Surge Suppressor
Cryptovariable
20. Communication of a security incident to stakeholders and data owners.
ITSEC
Notification
Mobile Site
Fault
21. Control category- to discourage an adversary from attempting to access
Near Site
5 Rules Of Evidence
Centralized Access Control Technologies
Deterrent
22. Information about data or records
Mitigate
Forensic Copy
Network Attached Storage (NAS)
Metadata
23. A design methodology which addresses risk early and often
Overlapping Fragment Attack
Spiral
Voice Over IP (VOIP)
Bit
24. Location where coordination and execution of BCP or DRP is directed
Virtual Memory
Data Dictionary
Emergency Operations Center (EOC)
Wait
25. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Operational Exercise
Burn
Relocation
Top Secret
26. Prolonged loss of commercial power
Blackout
Masked/Interruptible
Multi-Tasking
Consistency
27. Moving the alphabet intact a certain number spaces
Picking
Shift Cipher (Caesar)
Education
Proprietary
28. People who interact with assets
Critical Functions
Resumption
User
Workaround Procedures
29. An availability attack - to consume resources to the point of exhaustion
Processes are Isolated By
Denial Of Service
Information Owner
Database Shadowing
30. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Reference Monitor
Rollback
Initialization Vector
Firewall
31. A programming device use in development to circumvent controls
Basics Of Secure Design
Patch Panels
Alternate Data Streams (File System Forks)
Trapdoors (Backdoors) (Maintenance Hooks)
32. Intellectual property protection for an invention
Application Programming Interface
Worldwide Interoperability for Microwave Access (WI-MAX )
Patent
Classification
33. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Secondary Storage
Cookie
Fire Prevention
ISO/IEC 27002
34. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Double Blind Testing
Contingency Plan
Event
Honeynet
35. A database backup type which records at the transaction level
Forward Recovery
Open Mail Relay Servers
Remote Journaling
Central Processing Unit (CPU)
36. Recovery alternative - a building only with sufficient power - and HVAC
Cold Site
Analysis
Disaster Recovery Teams (Business Recovery Teams)
Remote Journaling
37. To move from location to location - keeping the same function
Payload
Data Recovery
Hijacking
Job Rotation
38. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Structured Walkthrough
Recovery Time Objectives
Activation
Alert
39. A shield against leakage of electromagnetic signals.
Rogue Access Points
Dictionary Attack
Alert/Alarm
Faraday Cage/ Shield
40. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Shift Cipher (Caesar)
System Downtime
Checkpoint
Business Records
41. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Civil Law
Interception
Orange Book D Classification
Walk Though
42. The managerial approval to operate a system based upon knowledge of risk to operate
Accreditation
Asymmetric
Recovery
Sniffing
43. A trusted issuer of digital certificates
Certification Authority
File Server
Worm
Keystroke Logging
44. More than one processor sharing same memory - also know as parallel systems
Substitution
Multi-Processor
Debriefing/Feedback
Inference
45. To set the clearance of a subject or the classification of an object
Labeling
Virus
True Attack Stimulus
HTTP Response Splitting
46. Code breaking - practice of defeating the protective properties of cryptography.
Cryptovariable
Cryptanalysis
Mirrored Site
Fire Detection
47. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Noise
System Downtime
Emergency Procedures
High-Risk Areas
48. Creation distribution update and deletion
Eavesdropping
Proxies
Discretionary
Key Management
49. A backup type which creates a complete copy
Plan Maintenance Procedures
Restoration
Replication
Elements of Negligence
50. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Data Recovery
JPEG (Joint Photographic Experts Group)
Information Owner
Moore's Law