SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Man-In-The-Middle Attack
Source Routing Exploitation
Checklist Test (desk check)
Faraday Cage/ Shield
2. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Class
Encapsulation
Criminal Law
Alarm Filtering
3. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Attacker (Black hat - Hacker)
Gateway
Exposure
Life Cycle of Evidence
4. Descrambling the encrypted message with the corresponding key
Binary
Hard Disk
Decipher
Surveillance
5. A set of laws that the organization agrees to be bound by
Cryptovariable
Information Flow Model
Administrative Law
Adware
6. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Certificate Revocation List (CRL)
Access Control Attacks
Data Leakage
Sniffing
7. A test conducted on one or more components of a plan under actual operating conditions.
Operational Test
Moore's Law
Civil Or Code Law
Analysis
8. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Electrostatic Discharge
Fault Tolerance
Forward Recovery
Data Backups
9. Impossibility of denying authenticity and identity
Honeypot
Non-Repudiation
Slack Space
Chain of Custody
10. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Mock Disaster
Activation
Interception
Analysis
11. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Hot Spares
Deletion
User Mode (problem or program state)
Concentrator
12. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Resumption
Shift Cipher (Caesar)
Enticement
Shadowing (file shadowing)
13. The guardian of asset(s) - a maintenance activity
Control Category
Custodian
Key Clustering
Rootkit
14. More than one CPU on a single board
Layering
TEMPEST
Byte
Multi-Core
15. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Firewall
Mandatory
Phishing
Accountability
16. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Remote Journaling
Public Key Infrastructure (PKI)
Examples of non-technical security components
Plaintext
17. To jump to a conclusion
Mitigate
Examples of non-technical security components
Cryptovariable
Inference
18. Act of scrambling the cleartext message by using a key.
Labeling
Isolation
Encipher
Kerckhoff's Principle
19. Using many alphabets
Masquerading
Polyalphabetic
Internal Use Only
UPS
20. Some systems are actually run at the alternate site
Metadata
Keyed-Hashing For Message Authentication
Authorization
Parallel Test
21. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Mandatory Access Control (MAC)
Compartmentalize
Operational
Bumping
22. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Mock Disaster
Data Recovery
Detective
Accreditation
23. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Change Control
Incident
Contact List
Critical Functions
24. Unsolicited commercial email
Parallel Test
Spam
Mixed Law System
Salami
25. Written suggestions that direct choice to a few alternatives
Need-To-Know
Accountability
Guidelines
Preemptive
26. Regular operations are stopped and where processing is moved to the alternate site.
Full-Interruption test
Remote Journaling
Intrusion Prevention Systems
Examples of technical security components
27. Individuals and departments responsible for the storage and safeguarding of computerized data.
Faraday Cage/ Shield
Data Custodian
Mandatory
Processes are Isolated By
28. Potentially retrievable data residue that remains following intended erasure of data.
Binary
File Sharing
Liability
Remanence
29. A backup type - for databases at a point in time
Monitor
Shadowing (file shadowing)
Total Risk
Electromagnetic Interference (EMI)
30. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
File Server
Acronym for American Standard Code for Information Interchange (ASCII)
Source Routing Exploitation
Simulation Test
31. Inappropriate data
Simulation Test
Polymorphism
Surveillance
Malformed Input
32. A process state - (blocked) needing input before continuing
Infrastructure
Wait
Event
Business Continuity Planning (BCP)
33. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Hot Site
Forensic Copy
Risk Mitigation
Contingency Plan
34. Those who initiate the attack
Threat Agent
Standalone Test
Information Owner
Alternate Site
35. The partial or full duplication of data from a source database to one or more destination databases.
Database Replication
Surge
Security Domain
Least Privilege
36. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
TEMPEST
Mirrored Site
Risk
Embedded Systems
37. Objects or programming that looks the different but act same
Desk Check Test
Polymorphism
Contingency Plan
Compartmentalize
38. Organized group of compromised computers
Botnet
Discretionary Access Control (DAC)
File Server
Operational Test
39. A planned or unplanned interruption in system availability.
System Downtime
Time Of Check/Time Of Use
Critical Functions
Data Dictionary
40. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Database Shadowing
Object Reuse
Corrective
Data Integrity
41. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Database Replication
Incident Response
Encryption
Redundant Array Of Independent Drives (RAID)
42. Business and technical process of applying security software updates in a regulated periodic way
Sniffing
Patch Management
Consistency
Near Site
43. Location to perform the business function
Detection
Alternate Site
Hacker
Key Clustering
44. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Data Backup Strategies
Threats
Information Flow Model
Transients
45. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
High-Risk Areas
Mission-Critical Application
Multi-Core
Masquerading
46. Communicate to stakeholders
Denial Of Service
Threat Agent
Fire Classes
Debriefing/Feedback
47. Responsibility for actions
Sharing
Uninterruptible Power Supply (UPS)
Intrusion Prevention Systems
Liability
48. Record of system activity - which provides for monitoring and detection.
Total Risk
CPU Cache
Network Attached Storage (NAS)
Log
49. Intellectual property management technique for identifying after distribution
Wireless Fidelity (Wi-Fi )
Watermarking
Waterfall
DR Or BC Coordinator
50. Potential danger to information or systems
Chain of Custody
Administrative
Enticement
Threats