SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Object Oriented Programming (OOP)
Infrastructure
Multilevel Security System
Hacker
2. Alerts personnel to the presence of a fire
Multi-Processing
TIFF (Tagged Image File Format)
SQL Injection
Fire Detection
3. Amount of time for restoring a business process or function to normal operations without major loss
Mobile Recovery
Maximum Tolerable Downtime (MTD)
Due Care
Waterfall
4. Malware that makes small random changes to many data points
Liability
Data Diddler
Administrative Law
Wait
5. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Top Secret
Byte Level Deletion
Workaround Procedures
User
6. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Wait
Computer Forensics
Running
True Attack Stimulus
7. A collection of information designed to reduce duplication and increase integrity
Databases
Workaround Procedures
Safeguard
Desk Check Test
8. An administrative unit or a group of objects and subjects controlled by one reference monitor
Mirrored Site
Security Domain
Log
Data Backup Strategies
9. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Business Interruption
Degauss
Information Flow Model
Administrative
10. Someone who want to know how something works - typically by taking it apart
Deadlock
Patent
Residual Risk
Hacker
11. Mediation of covert channels must be addressed
Worldwide Interoperability for Microwave Access (WI-MAX )
Maximum Tolerable Downtime (MTD)
Durability
Information Flow Model
12. A telephone exchange for a specific office or business.
Memory Management
Private Branch Exchange (PBX)
Kernel
Enticement
13. Code making
Spiral
Risk Assessment
Cryptography
Conflict Of Interest
14. Security policy - procedures - and compliance enforcement
Distributed Processing
Examples of non-technical security components
Access Control
Malformed Input
15. Control category- to give instructions or inform
Rollback
Worm
Business Unit Recovery
Directive
16. A state for operating system tasks only
Total Risk
Supervisor Mode (monitor - system - privileged)
Data Recovery
Examples of technical security components
17. Unused storage capacity
Slack Space
Class
Satellite
Classification
18. A backup of data located where staff can gain access immediately
Hearsay
Incident Response Team
On-Site
Cross-Site Scripting
19. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Containment
Encryption
Satellite
Certification
20. Evidence must be: admissible - authentic - complete - accurate - and convincing
Electronic Vaulting
Running Key
Brouter
5 Rules Of Evidence
21. Natural occurrence in circuits that are in close proximity
Firewalls
Malformed Input
Full Test (Full Interruption)
Interference (Noise)
22. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Classification
Business Continuity Steering Committee
Boot (V.)
War Dialing
23. More than one processor sharing same memory - also know as parallel systems
Virtual Memory
Gateway
Inference
Multi-Processor
24. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Authentic
Internal Use Only
Recovery
Worldwide Interoperability for Microwave Access (WI-MAX )
25. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Sampling
Time Of Check/Time Of Use
Information Technology Security Evaluation Criteria - ITSEC
Copyright
26. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
TEMPEST
Sniffing
Fire Classes
Mandatory
27. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Deletion
Administrative
Data Diddler
ITSEC
28. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Bridge
Control Category
Hub
Electromagnetic Interference (EMI)
29. Process whereby data is removed from active files and other data storage structures
Deletion
Method
Need-To-Know
Tort
30. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Recovery Period
TEMPEST
Adware
IP Address Spoofing
31. A Denial of Service attack that floods the target system with connection requests that are not finalized.
Permutation /Transposition
SYN Flooding
Data Custodian
Boot (V.)
32. Object based description of a system or a collection of resources
Access Control Matrix
Simulation
Storage Area Network (SAN)
Blind Testing
33. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Hot Spares
File
Least Privilege
Strategic
34. Memory management technique that allows two processes to run concurrently without interaction
Concatenation
Critical Functions
Key Management
Protection
35. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Hacker
Key Space
Virtual Memory
Pervasive Computing and Mobile Computing Devices
36. Total number of keys available that may be selected by the user of a cryptosystem
Cross-Site Scripting
Operating
Multi-Processor
Key Space
37. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Honeypot
Redundant Array Of Independent Drives (RAID)
Information Flow Model
Disaster Recovery Tape
38. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Business Recovery Team
Civil Law
Hash Function
Access Control
39. Wrong against society
Hub
Criminal Law
Risk Assessment
Residual Data
40. Communication of a security incident to stakeholders and data owners.
Notification
Vital Record
Marking
TNI (Red Book)
41. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Electronic Vaulting
Test Plan
Repeaters
Multi-Processing
42. To evaluate the current situation and make basic decisions as to what to do
Tracking
Domain
Triage
Encryption
43. With enough computing power trying all possible combinations
Sampling
Internal Use Only
Brute Force
Packet Filtering
44. Regular operations are stopped and where processing is moved to the alternate site.
Waterfall
Full-Interruption test
Ring Protection
Denial Of Service
45. Written internalized or nationalized norms that are internal to an organization
Standard
Tar Pits
Executive Succession
BCP Testing Drills and Exercises
46. Data or interference that can trigger a false positive
High-Risk Areas
Noise
Security Clearance
Layering
47. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Collisions
Cross-Site Scripting
ISO/IEC 27001
Voice Over IP (VOIP)
48. A basic level of network access control that is based upon information contained in the IP packet header.
Security Blueprint
Framework
Packet Filtering
Worm
49. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Incident
Discretionary
Executive Succession
Data Marts
50. System mediation of access with the focus on the context of the request
Content Dependent Access Control
Desk Check Test
Deterrent
Mitigate