SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Act of scrambling the cleartext message by using a key.
Classification Scheme
Mitigate
Containment
Encipher
2. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Operational Impact Analysis
Sharing
System Downtime
Basics Of Secure Design
3. A layer 3 device that used to connect two or more network segments and regulate traffic.
Multi-Processing
Control Category
Data Diddler
Routers
4. Controls deployed to avert unauthorized and/or undesired actions.
Prevention
Electrostatic Discharge
Deterrent
Byte Level Deletion
5. Granular decision by a system of permitting or denying access to a particular resource on the system
Complete
Non-Discretionary Access Control
Authorization
Process Isolation
6. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Application Programming Interface
Central Processing Unit (CPU)
Conflict Of Interest
Gateway
7. Event(s) that cause harm
Incident
Mobile Recovery
Identification
Fault Tolerance
8. One way encryption
Coaxial Cable
Hash Function
Salami
Keyed-Hashing For Message Authentication
9. Renders the record inaccessible to the database management system
Ethics
Switches
Record Level Deletion
3 Types of harm Addressed in computer crime laws
10. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
False Attack Stimulus
Debriefing/Feedback
Fire Classes
Monitor
11. A risk assessment method - intrinsic value
Data Leakage
Qualitative
Directive
Threats
12. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Boot (V.)
Full Test (Full Interruption)
Non-Interference
JPEG (Joint Photographic Experts Group)
13. Controls for logging and alerting
Chain Of Custody
Intrusion Detection Systems
ISO/IEC 27001
Binary
14. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Steganography
Residual Risk
Alternate Site
Data Diddler
15. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Authorization
Non-Discretionary Access Control
Activation
Trojan Horse
16. An encryption method that has a key as long as the message
Electronic Vaulting
Notification
Running Key
State Machine Model
17. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
File
Data Owner
Metadata
Information Flow Model
18. Descrambling the encrypted message with the corresponding key
Emergency Operations Center (EOC)
Custodian
Honeypot
Decipher
19. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Mirroring
Blackout
Total Risk
Authentication
20. Organized group of compromised computers
Botnet
Deleted File
Fire Suppression
Countermeasure
21. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Least Privilege
Steganography
Incident Response Team
Computer System Evidence
22. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Replication
Reference Monitor
Cookie
Eavesdropping
23. More than one CPU on a single board
Capability Tables
Multi-Core
Ethics
Event
24. System mediation of access with the focus on the context of the request
Denial Of Service
Deterrent
Content Dependent Access Control
Information Flow Model
25. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Intrusion Prevention Systems
Transfer
Asymmetric
26. Control category - more than one control on a single asset
Framework
Cryptanalysis
Emanations
Compensating
27. A process state - to be executing a process on the CPU
Operational Impact Analysis
Running
False (False Positive)
Radio Frequency Interference (RFI)
28. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Running
True Attack Stimulus
Twisted Pair
Change Control
29. The connection between a wireless and wired network.
Running
Access Point
File
Key Clustering
30. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Embedded Systems
Targeted Testing
Mandatory Access Control (MAC)
Fire Detection
31. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Encipher
Man-In-The-Middle Attack
Coaxial Cable
Moore's Law
32. A secure connection to another network.
Application Programming Interface
IP Fragmentation
Gateway
Intrusion Detection Systems
33. Potential danger to information or systems
Wireless Fidelity (Wi-Fi )
TNI (Red Book)
Service Bureau
Threats
34. Vehicle stopping object
Degauss
BCP Testing Drills and Exercises
Exposure
Bollard
35. To segregate for the purposes of labeling
Compartmentalize
Site Policy Awareness
Threats
Protection
36. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Change Control
Network Attached Storage (NAS)
Certification
Byte Level Deletion
37. A control before attack
Safeguard
Classification Scheme
Brouter
Object Oriented Programming (OOP)
38. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Encapsulation
Custodian
Access Point
Initialization Vector
39. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Entrapment
Business Recovery Timeline
Public Key Infrastructure (PKI)
Tar Pits
40. An availability attack - to consume resources to the point of exhaustion
Cryptovariable
Legacy Data
Denial Of Service
Containment
41. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Accreditation
Business Unit Recovery
Business Continuity Program
Information Risk Management (IRM)
42. To evaluate the current situation and make basic decisions as to what to do
Revocation
Relocation
Life Cycle of Evidence
Triage
43. High frequency noise
Business Continuity Planning (BCP)
Orange Book B1 Classification
Electromagnetic Interference (EMI)
Storage Area Network (SAN)
44. The technical and risk assesment of a system within the context of the operating environment
Activation
Trapdoors (Backdoors) (Maintenance Hooks)
Cross Certification
Certification
45. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Detective
Corrective
Locard's Principle
Noise
46. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Kernel
Spyware
Quantitative Risk Analysis
Eavesdropping
47. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
SQL Injection
Security Clearance
Orange Book C2 Classification
Recovery
48. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Business Recovery Team
Due Care
Substitution
49. Tool which mediates access
Database Replication
Storage Area Network (SAN)
Control
Mirrored Site
50. Line by line translation from a high level language to machine code
Database Shadowing
Interpreter
Mobile Site
Teardrop