SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Planning with a goal of returning to the normal business function
Fault Tolerance
Restoration
Walk Though
Brouter
2. Control category- to discourage an adversary from attempting to access
Object Reuse
Hot Spares
Deterrent
Highly Confidential
3. A risk assessment method - intrinsic value
IP Address Spoofing
Maximum Tolerable Downtime (MTD)
Archival Data
Qualitative
4. Organized group of compromised computers
Injection
Processes are Isolated By
Data Diddler
Botnet
5. Hardware or software that is part of a larger system
Cross-Site Scripting
Ethics
Guidelines
Embedded
6. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Kerckhoff's Principle
Public Key Infrastructure (PKI)
Risk Assessment
Evidence
7. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Multiplexers
Emergency
Due Diligence
Emanations
8. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Proxies
Blackout
Structured Walk-Through Test
Convincing
9. Someone who wants to cause harm
Electromagnetic Interference (EMI)
Attacker (Black hat - Hacker)
Liability
Sag/Dip
10. Small data warehouse
Data Marts
File Server
Damage Assessment
Control Category
11. Transaction controls for a database - a return to a previous state
Common Law
Rollback
Multi-Party Control
Assembler
12. Owner directed mediation of access
Vital Record
Checklist Test (desk check)
Non-Repudiation
Discretionary
13. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
File Sharing
Site Policy Awareness
Contact List
Mandatory
14. A state for operating system tasks only
Privacy Laws
Supervisor Mode (monitor - system - privileged)
Fault Tolerance
Contingency Plan
15. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Residual Risk
Discretionary
Vulnerability
Alternate Site
16. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Patch Management
Encryption
Multi-Programming
Pointer
17. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Job Training
Tort
Parallel Test
Tactical
18. Encryption system using a pair of mathematically related unequal keys
Emergency Operations Center (EOC)
Permutation /Transposition
Contingency Plan
Asymmetric
19. Real-time data backup ( Data Mirroring)
Compression
Database Shadowing
Fragmented Data
Incident Response
20. The study of cryptography and cryptanalysis
Burn
Alternate Data Streams (File System Forks)
Message Digest
Cryptology
21. Vehicle stopping object
Concentrator
Plaintext
Bollard
Operational Test
22. To smooth out reductions or increases in power
Highly Confidential
Distributed Denial Of Service
Multi-Tasking
UPS
23. May be responsible for overall recovery of an organization or unit(s).
Radio Frequency Interference (RFI)
Desk Check Test
DR Or BC Coordinator
Business Impact Analysis
24. Unused storage capacity
Basics Of Secure Design
Birthday Attack
Slack Space
Business Recovery Team
25. Communicate to stakeholders
Debriefing/Feedback
Data Warehouse
Assembler
Detective
26. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Public Key Infrastructure (PKI)
File Server
Redundant Array Of Independent Drives (RAID)
Accreditation
27. What is will remain - persistence
IP Address Spoofing
Legacy Data
Durability
Identification
28. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Chain of Custody
Off-Site Storage
State Machine Model
Blackout
29. Unauthorized access of network devices.
Trademark
Structured Walk-Through Test
Physical Tampering
Fiber Optics
30. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Strong Authentication
Virus
Code
Administrative
31. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Initialization Vector
Asymmetric
Incident
Trade Secret
32. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Walk Though
Operating
Disaster Recovery Plan
ITSEC
33. Communication of a security incident to stakeholders and data owners.
State Machine Model
Criminal Law
Notification
Authentication
34. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Man-In-The-Middle Attack
Multi-Tasking
Brownout
Smurf
35. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Memory Management
Mock Disaster
Bumping
Internal Use Only
36. A technology that reduces the size of a file.
Initialization Vector
Compression
Decipher
Twisted Pair
37. Descrambling the encrypted message with the corresponding key
Inference
Decipher
Patch Management
Spam
38. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Mandatory
Mixed Law System
Investigation
Tar Pits
39. Written step-by-step actions
Wireless Fidelity (Wi-Fi )
Procedure
Need-To-Know
Honeypot
40. A program that waits for a condition or time to occur that executes an inappropriate activity
Activation
Distributed Denial Of Service
Logic Bomb
Brouter
41. Return to a normal state
Recovery
Cold Site
Mobile Recovery
EMI
42. Business and technical process of applying security software updates in a regulated periodic way
Patch Management
Preemptive
Recovery Time Objectives
Inrush Current
43. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Locard's Principle
Virus
High-Risk Areas
Hot Spares
44. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Disk Mirroring
Electromagnetic Interference (EMI)
Failure Modes and Effect Analysis (FEMA)
Distributed Denial Of Service
45. A system designed to prevent unauthorized access to or from a private network.
Trojan Horse
Information Flow Model
Firewall
Orange Book B2 Classification
46. Written internalized or nationalized norms that are internal to an organization
Standard
Metadata
Watermarking
Race Condition
47. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Recovery Strategy
Access Control Lists
Deleted File
Containment
48. Mediation of subject and object interactions
Declaration
Monitor
False Attack Stimulus
Access Control
49. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Complete
IP Fragmentation
Trade Secret
Data Integrity
50. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Mantrap (Double Door System)
Binary
Birthday Attack
File Server