SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security policy - procedures - and compliance enforcement
Examples of non-technical security components
Disk Mirroring
Overlapping Fragment Attack
Mobile Recovery
2. Try a list of words in passwords or encryption keys
Digital Certificate
Shift Cipher (Caesar)
Dictionary Attack
Faraday Cage/ Shield
3. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Emergency
True Attack Stimulus
Territoriality
Criminal Law
4. To collect many small pieces of data
Electrostatic Discharge
Hot Spares
File Level Deletion
Aggregation
5. Pertaining to law - lending it self to one side of an argument
Digital Signature
Convincing
Switches
Fault Tolerance
6. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
E-Mail Spoofing
Masquerading
TIFF (Tagged Image File Format)
Threats
7. Object based description of a single resource and the permission each subject
Encipher
Checksum
Patent
Access Control Lists
8. Real-time data backup ( Data Mirroring)
Fraggle
Business Impact Assessment (BIA)
Database Shadowing
Kerckhoff's Principle
9. Just enough access to do the job
Least Privilege
Radio Frequency Interference (RFI)
Sharing
Information Owner
10. Maximum tolerance for loss of certain business function - basis of strategy
Remote Access Trojan
Accreditation
Shift Cipher (Caesar)
Recovery Time Objectives
11. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Security Kernel
Orange Book C2 Classification
Corrective
Noise
12. Small data warehouse
Data Marts
Source Routing Exploitation
Remanence
Worm
13. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Checklist Test (desk check)
Information Flow Model
Directive
Restoration
14. Property that data is represented in the same manner at all times
Consistency
Bumping
Business Records
ISO/IEC 27001
15. Binary decision by a system of permitting or denying access to the entire system
Authentication
Simulation
Redundant Array Of Independent Drives (RAID)
Simulation Test
16. A physical enclosure for verifying identity before entry to a facility
Data Marts
Open Mail Relay Servers
Data Diddler
Mantrap (Double Door System)
17. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Control
Microwave
Mandatory Vacations
Digital Certificate
18. Pertaining to law - accepted by a court
Discretionary
Denial Of Service
Admissible
Masquerading
19. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Identification and notification of an unauthorized and/or undesired action
Bumping
Detection
Class
Durability
21. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Non-Repudiation
Electronic Vaulting
Off-Site Storage
Memory Management
22. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Transients
Non-Discretionary Access Control
Business Continuity Planning (BCP)
Hearsay
23. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Debriefing/Feedback
Recovery Point Objective (RPO)
Salami
Byte
24. Recovery alternative - short-term - high cost movable processing location
Mobile Site
Database Replication
Spam
Phishing
25. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Fraggle
Access Control Attacks
Liability
Common Law
26. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Mock Disaster
Residual Risk
War Driving
Content Dependent Access Control
27. Control category - more than one control on a single asset
Compensating
Modification
War Dialing
Mantrap (Double Door System)
28. The one person responsible for data - its classification and control setting
Information Owner
Fragmented Data
Keystroke Logging
Deleted File
29. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Active Data
Simulation Test
Cookie
Denial Of Service
30. Intellectual property protection for an invention
Dictionary Attack
Microwave
Labeling
Patent
31. A state where two subjects can access the same object without proper mediation
Internal Use Only
Race Condition
Encipher
Man-In-The-Middle Attack
32. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Examples of non-technical security components
Warm Site
Log
Mock Disaster
33. A telephone exchange for a specific office or business.
Remanence
Private Branch Exchange (PBX)
Compression
Strong Authentication
34. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Initialization Vector
Metadata
Fire Suppression
Directive
35. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Safeguard
IP Address Spoofing
Computer Forensics
Risk Mitigation
36. Object reuse protection and auditing
Byte Level Deletion
Orange Book C2 Classification
Virus
Mandatory Vacations
37. A test conducted on one or more components of a plan under actual operating conditions.
Administrative Laws
Data Backup Strategies
Isolation
Operational Test
38. Memory management technique that allows two processes to run concurrently without interaction
The ACID Test
Kerckhoff's Principle
Protection
Common Law
39. OOP concept of a distinct copy of the class
Object
Emergency
Method
Deletion
40. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
One Time Pad
Accountability
Technical Access Controls
Quantitative Risk Analysis
41. Inference about encrypted communications
Encipher
Side Channel Attack
Access Control
Hard Disk
42. Independent malware that requires user interaction to execute
Life Cycle of Evidence
Common Criteria
Resumption
Virus
43. Written suggestions that direct choice to a few alternatives
Mirrored Site
Data Diddler
Guidelines
Due Diligence
44. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Access Point
Byte Level Deletion
Microwave
Electronic Vaulting
45. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Structured Walk-Through Test
Tapping
Alternate Site
MOM
46. Statistical probabilities of a collision are more likely than one thinks
Fault
Full-Interruption test
Birthday Attack
Byte
47. Location where coordination and execution of BCP or DRP is directed
Emergency Operations Center (EOC)
Hot Spares
Primary Storage
Basics Of Secure Design
48. Communication of a security incident to stakeholders and data owners.
File Level Deletion
Administrative
Notification
Fault Tolerance
49. To jump to a conclusion
Highly Confidential
Inference
Fiber Optics
Compartmentalize
50. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Emergency Operations Center (EOC)
One Time Pad
Record Level Deletion
Satellite