SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Those who initiate the attack
Public Key Infrastructure (PKI)
Threat Agent
Sag/Dip
Data Diddler
2. Recording the Who What When Where How of evidence
Security Domain
Dictionary Attack
Compensating
Chain Of Custody
3. Guidelines within an organization that control the rules and configurations of an IDS
Open Mail Relay Servers
Site Policy
Top Secret
Copyright
4. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Labeling
Proprietary
Disaster Recovery Teams (Business Recovery Teams)
Data Diddler
5. Creation distribution update and deletion
Key Management
Debriefing/Feedback
Application Programming Interface
Disaster Recovery Teams (Business Recovery Teams)
6. The partial or full duplication of data from a source database to one or more destination databases.
Service Bureau
Boot (V.)
Database Replication
Authentication
7. Moving the alphabet intact a certain number spaces
Concatenation
Framework
Shift Cipher (Caesar)
Control
8. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Hub
TIFF (Tagged Image File Format)
Warm Site
Service Bureau
9. One way encryption
Blackout
Hash Function
Byte
Plan Maintenance Procedures
10. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Residual Risk
Non-Repudiation
Databases
Byte Level Deletion
11. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Hash Function
Instance
Workaround Procedures
Isolation
12. Recovery alternative which includes cold site and some equipment and infrastructure is available
The ACID Test
Warm Site
5 Rules Of Evidence
Generator
13. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Business Recovery Timeline
DR Or BC Coordinator
Object Reuse
Critical Functions
14. A unit of execution
Threads
Firewalls
Checklist Test (desk check)
Fault
15. Real-time data backup ( Data Mirroring)
Checklist Test (desk check)
Multi-Programming
Database Shadowing
Consistency
16. A design methodology which addresses risk early and often
Spiral
Reciprocal Agreement
Cross Certification
Running Key
17. A process state - to be executing a process on the CPU
Orange Book B2 Classification
Recovery Time Objectives
Data Backup Strategies
Running
18. The connection between a wireless and wired network.
Accreditation
Access Point
Cipher Text
Alarm Filtering
19. An availability attack - to consume resources to the point of exhaustion
Ring Protection
Territoriality
Encipher
Denial Of Service
20. Encryption system using shared key/private key/single key/secret key
Protection
Rootkit
Sequence Attacks
Symmetric
21. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Key Space
Information Technology Security Evaluation Criteria - ITSEC
One Time Pad
Source Routing Exploitation
22. Encryption system using a pair of mathematically related unequal keys
Metadata
Plain Text
Critical Functions
Asymmetric
23. A back up type - where the organization has excess capacity in another location.
Multi-Tasking
Cross Certification
Distributed Processing
Need-To-Know
24. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Locard's Principle
Non-Discretionary Access Control
Mandatory Access Control (MAC)
Compression
25. A backup type which creates a complete copy
Replication
Instance
Slack Space
Gateway
26. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Framework
Orange Book B1 Classification
Risk Assessment / Analysis
Time Of Check/Time Of Use
27. Collection of data on business functions which determines the strategy of resiliency
Computer Forensics
Business Impact Assessment (BIA)
Business Unit Recovery
TEMPEST
28. Written step-by-step actions
Framework
Event
Procedure
Distributed Processing
29. A process state - (blocked) needing input before continuing
Wait
Disaster Recovery Tape
TCSEC (Orange Book)
Security Kernel
30. Mitigate damage by isolating compromised systems from the network.
Security Blueprint
Containment
Databases
IDS Intrusion Detection System
31. The core of a computer that calculates
Initialization Vector
Relocation
3 Types of harm Addressed in computer crime laws
Central Processing Unit (CPU)
32. Quantity of risk remaining after a control is applied
Business Continuity Planning (BCP)
Byte Level Deletion
Residual Risk
One Time Pad
33. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Convincing
Failure Modes and Effect Analysis (FEMA)
Transfer
Denial Of Service
34. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Kernel
Orange Book A Classification
Deleted File
Inrush Current
35. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Simulation
Byte
Authentic
Multi-Core
36. Methodical research of an incident with the purpose of finding the root cause
Investigation
ISO/IEC 27001
Chain Of Custody
Radio Frequency Interference (RFI)
37. Someone who want to know how something works - typically by taking it apart
5 Rules Of Evidence
Hacker
Site Policy
Tar Pits
38. Hiding the fact that communication has occurred
Vital Record
Coaxial Cable
Reciprocal Agreement
Steganography
39. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Data Dictionary
Crisis
Byte Level Deletion
Data Integrity
40. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
Multi-Processing
TEMPEST
Network Attached Storage (NAS)
Cross Certification
41. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Faraday Cage/ Shield
Proxies
Replication
Orange Book C2 Classification
42. The chance that something negative will occur
Security Clearance
Secondary Storage
Risk
Public Key Infrastructure (PKI)
43. Effort/time needed to overcome a protective measure
Fraggle
Work Factor
Revocation
Shadowing (file shadowing)
44. Statistical probabilities of a collision are more likely than one thinks
Race Condition
Disaster
Birthday Attack
Patch Panels
45. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Pointer
Exposure
Recovery
Cold Site
46. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
Tapping
Operational Exercise
Trapdoors (Backdoors) (Maintenance Hooks)
Consistency
47. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Spam
Cross Certification
Stopped
Business Records
48. Alerts personnel to the presence of a fire
Exercise
Polymorphism
ff Site
Fire Detection
49. Forgery of the sender's email address in an email header.
Electronic Vaulting
E-Mail Spoofing
Data Owner
Guidelines
50. Malware that makes many small changes over time to a single data point or system
Salami
False (False Positive)
Checkpoint
Damage Assessment