SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Electronic Vaulting
Patent
Contingency Plan
Business Interruption Insurance
2. Record of system activity - which provides for monitoring and detection.
Data Leakage
Contact List
Log
Proxies
3. For PKI - to have more than one person in charge of a sensitive function
Accountability
Multi-Party Control
File Shadowing
Firewalls
4. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Tar Pits
Vital Record
Top Secret
Standard
5. Outputs within a given function are the same result
Collisions
Byte
Electromagnetic Interference (EMI)
CobiT
6. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Corrective
Declaration
Structured Walk-Through Test
Qualitative
7. A secure connection to another network.
Gateway
Computer System Evidence
Memory Management
Consistency
8. A computer designed for the purpose of studying adversaries
Honeypot
Mobile Recovery
Site Policy
Ethics
9. For PKI - to store another copy of a key
Incident Manager
Checksum
Archival Data
Key Escrow
10. Define the way in which the organization operates.
Tactical
Proprietary
Brute Force
Keystroke Logging
11. Sudden rise in voltage in the power supply.
Electromagnetic Interference (EMI)
Surge
Certificate Revocation List (CRL)
Chain Of Custody
12. Autonomous malware that requires a flaw in a service
Worm
Adware
Blackout
Trademark
13. A record that must be preserved and available for retrieval if needed.
Digital Signature
Vital Record
Damage Assessment
Orange Book B1 Classification
14. The hard drive
IDS Intrusion Detection System
Secondary Storage
Risk Assessment
Architecture
15. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Multilevel Security System
Memory Management
Security Domain
Electronic Vaulting
16. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Secondary Storage
Structured Walkthrough
Residual Risk
Object
17. Abstract and mathematical in nature - defining all possible states - transitions and operations
Sag/Dip
State Machine Model
Distributed Processing
Waterfall
18. More than one processor sharing same memory - also know as parallel systems
Convincing
Uninterruptible Power Supply (UPS)
Multi-Processor
Authorization
19. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Dangling Pointer
Protection
Secondary Storage
Alarm Filtering
21. Third party processes used to organize the implementation of an architecture
Framework
Shielding
Architecture
Hard Disk
22. Pertaining to law - verified as real
Authentication
Total Risk
Layering
Authentic
23. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.
Architecture
Risk Mitigation
Mixed Law System
Total Risk
24. Information about a particular data set
Metadata
Supervisor Mode (monitor - system - privileged)
Multi-Core
Pervasive Computing and Mobile Computing Devices
25. A type of attack involving attempted insertion - deletion or altering of data.
Modification
Intrusion Prevention Systems
Incident Response
Fiber Optics
26. Using small special tools all tumblers of the lock are aligned - opening the door
Database Shadowing
Sag/Dip
Picking
Proprietary
27. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Information Owner
System Life Cycle
Buffer Overflow
Criminal Law
28. Another subject cannot see an ongoing or pending update until it is complete
Cryptanalysis
Isolation
Mandatory Vacations
Burn
29. Initial surge of current
Inrush Current
Access Control Lists
Tapping
Security Blueprint
30. Recovery alternative - everything needed for the business function - except people and last backup
Fraggle
Virus
Birthday Attack
Hot Site
31. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Fire Classes
Brute Force
Deterrent
Pointer
32. Recovery alternative - short-term - high cost movable processing location
Mobile Site
EMI
Databases
CobiT
33. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Entrapment
Masked/Interruptible
Processes are Isolated By
Full Test (Full Interruption)
34. Memory management technique which allows data to be moved from one memory address to another
Strong Authentication
Firewall
Incident Response Team
Relocation
35. The partial or full duplication of data from a source database to one or more destination databases.
Business Records
Fire Classes
Recovery Strategy
Database Replication
36. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
System Life Cycle
Computer System Evidence
Pointer
Interference (Noise)
37. A protocol for the efficient transmission of voice over the Internet
Active Data
Voice Over IP (VOIP)
BCP Testing Drills and Exercises
Electromagnetic Interference (EMI)
38. An alert or alarm that is triggered when no actual attack has taken place
False (False Positive)
Shift Cipher (Caesar)
Information Flow Model
Time Of Check/Time Of Use
39. Reduction of voltage by the utility company for a prolonged period of time
Standard
Encapsulation
Brownout
Security Kernel
40. A template for the designing the architecture
Authentication
Process Isolation
Security Blueprint
Critical Records
41. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Identification
Change Control
SYN Flooding
Incident
42. Two certificate authorities that trust each other
Cross Certification
Key Clustering
Deadlock
Debriefing/Feedback
43. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Classification
Discretionary
Lattice
Teardrop
44. Recording the Who What When Where How of evidence
Chain Of Custody
Recovery Strategy
Non-Discretionary Access Control
Interpreter
45. A subnetwork with storage devices servicing all servers on the attached network.
Fault
Storage Area Network (SAN)
2-Phase Commit
Secondary Storage
46. A layer 3 device that used to connect two or more network segments and regulate traffic.
Faraday Cage/ Shield
ISO/IEC 27002
Routers
Kerberos
47. Guidelines within an organization that control the rules and configurations of an IDS
Fiber Optics
Site Policy
Architecture
Ethics
48. Hiding the fact that communication has occurred
Steganography
Surge
Recovery Time Objectives
Reference Monitor
49. Vehicle or tool that exploits a weakness
Relocation
Backup
Threats
Electronic Vaulting
50. More than one CPU on a single board
Mitigate
Key Management
Modems
Multi-Core