SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Reprogrammable basic startup instructions
Standalone Test
Operational Exercise
File Level Deletion
Firmware
2. Hitting a filed down key in a lock with a hammer to open without real key
Containment
Attacker (Black hat - Hacker)
Bumping
Analysis
3. Of a system without prior knowledge by the tester or the tested
Atomicity
Data Owner
Double Blind Testing
TEMPEST
4. Memory management technique which allows data to be moved from one memory address to another
Relocation
Information Technology Security Evaluation Criteria - ITSEC
Certificate Revocation List (CRL)
BCP Testing Drills and Exercises
5. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Structured Walk-Through Test
Checksum
Firewall
Masked/Interruptible
6. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Supervisor Mode (monitor - system - privileged)
Cryptovariable
Trade Secret
Business Interruption Insurance
7. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Forensic Copy
Administrative Access Controls
Mandatory
Identification
8. Real-time - automatic and transparent backup of data.
Remote Journaling
Chain Of Custody
Kernel
Residual Risk
9. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Elements of Negligence
Administrative
Shadowing (file shadowing)
10. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Fiber Optics
Centralized Access Control Technologies
Job Rotation
False Attack Stimulus
11. Prolonged loss of commercial power
Preemptive
Decipher
Blackout
Detective
12. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Processes are Isolated By
Initialization Vector
Masquerading
Shadowing (file shadowing)
13. Recovery alternative - complete duplication of services including personnel
Mirrored Site
Threats
Job Rotation
Race Condition
14. Intermediate level - pertaining to planning
Operational
Access Point
Data Custodian
Bit
15. Pertaining to law - high degree of veracity
Accurate
Governance
Checkpoint
Surge Suppressor
16. Calculation encompassing threats - vulnerabilities and assets
Prevention
Hearsay
Total Risk
Embedded Systems
17. Object based description of a single resource and the permission each subject
Incident Manager
Resumption
Mobile Recovery
Access Control Lists
18. Maximum tolerance for loss of certain business function - basis of strategy
Discretionary Access Control (DAC)
3 Types of harm Addressed in computer crime laws
Reference Monitor
Recovery Time Objectives
19. Code breaking - practice of defeating the protective properties of cryptography.
Digital Signature
Cryptanalysis
Security Clearance
Discretionary Access Control (DAC)
20. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Near Site
Trademark
Active Data
Embedded Systems
21. People who interact with assets
Lattice
HTTP Response Splitting
Blackout
User
22. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Computer Forensics
Hot Site
Blind Testing
Sniffing
23. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Admissible
Structured Walkthrough
Authentication
Databases
24. Forging of an IP address.
IP Address Spoofing
Radio Frequency Interference (RFI)
Mirrored Site
Information Risk Management (IRM)
25. Property that data is represented in the same manner at all times
Inrush Current
Accurate
Intrusion Detection Systems
Consistency
26. Key
ITSEC
Risk
Cross Training
Cryptovariable
27. Individuals and departments responsible for the storage and safeguarding of computerized data.
Confidence Value
Trademark
Data Custodian
Bollard
28. Pertaining to law - lending it self to one side of an argument
Confidence Value
Convincing
Computer System Evidence
Multi-Party Control
29. System mediation of access with the focus on the context of the request
Alert
Routers
Content Dependent Access Control
Assembler
30. To move from location to location - keeping the same function
Job Rotation
Activation
Threads
Sampling
31. Sphere of influence
Domain
Protection
Polyalphabetic
Substitution
32. Those who initiate the attack
Vital Record
Mirroring
Electronic Vaulting
Threat Agent
33. A design methodology which executes in a linear one way fashion
Territoriality
Collisions
Waterfall
Tort
34. Unauthorized wireless network access device.
Rogue Access Points
ITSEC
Near Site
Logic Bomb
35. An individuals conduct that violates government laws developed to protect the public
Honeypot
Burn
Classification
Criminal Law
36. To start business continuity processes
Activation
Brouter
Admissible
Access Control
37. Mitigate damage by isolating compromised systems from the network.
Containment
Residual Risk
Entrapment
Authorization
38. Something that happened
Cryptovariable
Database Shadowing
User
Event
39. Uncleared buffers or media
Worm
Object Reuse
Rootkit
Multi-Tasking
40. A signal suggesting a system has been or is being attacked.
Security Clearance
Alert/Alarm
Multilevel Security System
Lattice
41. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Business Continuity Program
Privacy Laws
Risk Assessment / Analysis
Isolation
42. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Computer Forensics
Data Diddler
War Dialing
Recovery Period
43. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
MOM
Fault Tolerance
Cryptology
TNI (Red Book)
44. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
Contact List
Assembler
Virtual Memory
45. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Packet Filtering
Access Point
Alarm Filtering
Embedded Systems
46. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Embedded
System Life Cycle
Hard Disk
Wait
47. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Due Care
Logic Bomb
Legacy Data
Teardrop
48. Line noise that is superimposed on the supply circuit.
Redundant Servers
Digital Certificate
Operational Exercise
Transients
49. Process whereby data is removed from active files and other data storage structures
Primary Storage
Labeling
Polyalphabetic
Deletion
50. Wrong against society
Elements of Negligence
High-Risk Areas
Restoration
Criminal Law