SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A collection of data or information that has a name
Radio Frequency Interference (RFI)
Log
Sag/Dip
File
2. Information about a particular data set
Digital Signature
Deleted File
UPS
Metadata
3. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Distributed Processing
Firmware
War Dialing
TNI (Red Book)
4. Disruption of operation of an electronic device due to a competing electromagnetic field.
Prevention
Layering
EMI
BCP Testing Drills and Exercises
5. Regular operations are stopped and where processing is moved to the alternate site.
Routers
Cold Site
Full-Interruption test
Analysis
6. A description of a database
Control
Data Dictionary
Boot (V.)
Control Category
7. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Encryption
Containment
Tar Pits
Detective
8. Planning with a goal of returning to the normal business function
Proprietary
Cipher Text
Spam
Restoration
9. Reduction of voltage by the utility company for a prolonged period of time
Brownout
Capability Tables
Copyright
Fault
10. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Sag/Dip
Code
Critical Infrastructure
False Attack Stimulus
11. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Due Care
Education
Internal Use Only
CPU Cache
12. Define the way in which the organization operates.
5 Rules Of Evidence
Redundant Array Of Independent Drives (RAID)
Decipher
Proprietary
13. Ertaining to a number system that has just two unique digits.
Binary
Storage Area Network (SAN)
False Attack Stimulus
ff Site
14. A process state - to be either be unable to run waiting for an external event or terminated
Stopped
Recovery
Incident Handling
Fault
15. A risk assessment method - intrinsic value
Information Technology Security Evaluation Criteria - ITSEC
Qualitative
Patch Management
Need-To-Know
16. Try a list of words in passwords or encryption keys
War Dialing
Computer System Evidence
Dictionary Attack
Checkpoint
17. Weakness or flaw in an asset
Cross Training
Hot Site
Sag/Dip
Vulnerability
18. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Byte
Permutation /Transposition
Checksum
Burn
19. A distributed system's transaction control that requires updates to complete or rollback
Alert/Alarm
Integrated Test
The ACID Test
2-Phase Commit
20. Converts a high level language into machine language
Logic Bomb
Assembler
Reciprocal Agreement
Containment
21. Long term knowledge building
Trademark
Initialization Vector
Education
Data Marts
22. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Criminal Law
Access Control
Simulation Test
Redundant Array Of Independent Drives (RAID)
23. A program with an inappropriate second purpose
Analysis
Trojan Horse
Interception
ff Site
24. A technology that reduces the size of a file.
Compression
Structured Walk-Through Test
Spiral
Common Law
25. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification
Collisions
Change Control
ISO/IEC 27001
26. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Multiplexers
Fragmented Data
Injection
Watermarking
27. Potential danger to information or systems
Brute Force
Separation Of Duties
Threats
Radio Frequency Interference (RFI)
28. A backup type - for databases at a point in time
Shadowing (file shadowing)
Aggregation
Byte Level Deletion
IP Address Spoofing
29. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Recovery
Packet Filtering
Declaration
Virtual Memory
30. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Prevention
Computer Forensics
Encipher
Business Unit Recovery
31. Periodic - automatic and transparent backup of data in bulk.
Concentrator
Information Flow Model
Multi-Processor
Electronic Vaulting
32. Return to a normal state
Recovery
Shielding
Criminal Law
Application Programming Interface
33. A copy of transaction data - designed for querying and reporting
Plan Maintenance Procedures
Data Warehouse
Orange Book A Classification
Simulation Test
34. A unit of execution
Analysis
Information Technology Security Evaluation Criteria - ITSEC
Threads
Proxies
35. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Isolation
Worldwide Interoperability for Microwave Access (WI-MAX )
Disk Mirroring
Data Marts
36. A collection of information designed to reduce duplication and increase integrity
Databases
Physical Tampering
Job Rotation
Complete
37. Eight bits.
Examples of non-technical security components
Administrative Law
Accountability
Byte
38. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Business Recovery Timeline
Remote Journaling
Critical Records
Incident Manager
39. A telephone exchange for a specific office or business.
Key Management
Private Branch Exchange (PBX)
Criminal Law
Gateway
40. Subject based description of a system or a collection of resources
Capability Tables
Authentication
Bollard
Least Privilege
41. Encryption system using shared key/private key/single key/secret key
Metadata
Work Factor
Symmetric
Disaster Recovery Plan
42. A back up type - where the organization has excess capacity in another location.
Physical Tampering
2-Phase Commit
Burn
Distributed Processing
43. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Dictionary Attack
Byte Level Deletion
Surge Suppressor
Business Continuity Program
44. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
TIFF (Tagged Image File Format)
Strategic
Phishing
Business Recovery Timeline
45. A design methodology which addresses risk early and often
Logic Bomb
Site Policy
Spiral
Business Continuity Program
46. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Hard Disk
Plan Maintenance Procedures
Deterrent
Sequence Attacks
47. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Data Owner
Multi-Tasking
Orange Book B2 Classification
Containment
48. With enough computing power trying all possible combinations
Infrastructure
Virtual Memory
Emanations
Brute Force
49. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Surveillance
Mandatory Vacations
Strong Authentication
Risk Assessment / Analysis
50. A hash that has been further encrypted with a symmetric algorithm
User Mode (problem or program state)
Vital Record
Cryptology
Keyed-Hashing For Message Authentication