SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Written core statements that rarely change
Policy
Byte
Slack Space
Compartmentalize
2. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Orange Book C2 Classification
Object Oriented Programming (OOP)
Cryptology
Lattice
3. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Standalone Test
Distributed Processing
Strong Authentication
Running
4. Responsibility for actions
Dangling Pointer
Operational Test
Risk Mitigation
Liability
5. Employment education done once per position or at significant change of function
Job Training
ISO/IEC 27002
Brute Force
File
6. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
MOM
Checklist Test (desk check)
Alternate Site
Data Owner
7. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Orange Book B2 Classification
Phishing
Operating
Mock Disaster
8. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Emergency Operations Center (EOC)
Access Control
Declaration
Remote Access Trojan
9. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Life Cycle of Evidence
Bridge
War Dialing
Authentic
10. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Fire Detection
Durability
Overlapping Fragment Attack
Criminal Law
11. To collect many small pieces of data
Disaster Recovery Plan
Non-Interference
Aggregation
Surge Suppressor
12. Eavesdropping on network communications by a third party.
System Downtime
TEMPEST
Civil Law
Tapping
13. Policy or stated actions
Proprietary
Due Care
Process Isolation
Alert/Alarm
14. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Business Continuity Steering Committee
Malformed Input
Bit
Administrative Laws
15. A physical enclosure for verifying identity before entry to a facility
Examples of non-technical security components
BCP Testing Drills and Exercises
Mantrap (Double Door System)
Adware
16. Induces a crime - tricks a person - and is illegal
Entrapment
System Life Cycle
Tapping
On-Site
17. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Databases
Distributed Denial Of Service
Botnet
Certification
18. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Coaxial Cable
Forward Recovery
Elements of Negligence
Accountability
19. Eight bits.
Hash Function
Byte
Complete
Prevention
20. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
SQL Injection
Fault Tolerance
Patch Management
Memory Management
21. Guidelines within an organization that control the rules and configurations of an IDS
Plan Maintenance Procedures
Content Dependent Access Control
Site Policy
Structured Walk-Through Test
22. A running key using a random key that is never used again
Data Hiding
Fire Prevention
One Time Pad
Eavesdropping
23. A unit of execution
Legacy Data
Residual Risk
Threads
Mantrap (Double Door System)
24. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Recovery Strategy
Quantitative Risk Analysis
Keyed-Hashing For Message Authentication
Examples of non-technical security components
25. Recording the Who What When Where How of evidence
Convincing
Chain Of Custody
Containment
Structured Walk-Through Test
26. Recovery alternative - complete duplication of services including personnel
Compensating
Integrated Test
Mirrored Site
Near Site
27. Mediation of covert channels must be addressed
Vital Record
Information Flow Model
Phishing
Journaling
28. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Hard Disk
Business Records
Key Escrow
Data Leakage
29. Pertaining to law - accepted by a court
Running Key
Admissible
Mobile Site
Test Plan
30. A backup type which creates a complete copy
Total Risk
Replication
Call Tree
Memory Management
31. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Attacker (Black hat - Hacker)
Code
Backup
Desk Check Test
32. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Disaster Recovery Plan
Executive Succession
Disaster
TEMPEST
33. OOP concept of a template that consist of attributes and behaviors
Class
Intrusion Prevention Systems
Key Space
Governance
34. Mediation of subject and object interactions
Hot Site
Access Control
Admissible
Mobile Site
35. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Test Plan
Trade Secret
3 Types of harm Addressed in computer crime laws
Contingency Plan
36. Some systems are actually run at the alternate site
Generator
Entrapment
File Extension
Parallel Test
37. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Activation
Control Type
Data Leakage
Primary Storage
38. Mathematical function that determines the cryptographic operations
Rootkit
Algorithm
Business Continuity Planning (BCP)
Walk Though
39. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Redundant Servers
Fire Suppression
Warm Site
Business Records
40. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Metadata
Hub
Electronic Vaulting
Classification Scheme
41. Subset of operating systems components dedicated to protection mechanisms
Adware
Operational Test
Security Kernel
Consistency
42. A back up type - where the organization has excess capacity in another location.
Administrative
Distributed Processing
Off-Site Storage
Checksum
43. Recovery alternative which outsources a business function at a cost
3 Types of harm Addressed in computer crime laws
CPU Cache
Service Bureau
On-Site
44. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Archival Data
Picking
Deletion
BCP Testing Drills and Exercises
45. A process state - to be executing a process on the CPU
Data Dictionary
Running
IP Address Spoofing
Procedure
46. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Malformed Input
Algorithm
Interception
Guidelines
47. Methodical research of an incident with the purpose of finding the root cause
Investigation
Convincing
Tar Pits
Need-To-Know
48. Used to code/decode a digital data stream.
Non-Repudiation
Risk
Codec
User
49. Final purpose or result
Admissible
Denial Of Service
Payload
Alternate Site
50. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Analysis
Standard
Object Oriented Programming (OOP)
Injection