SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Weakness or flaw in an asset
ISO/IEC 27001
Vulnerability
Substitution
Near Site
2. Intellectual property protection for an confidential and critical process
Trade Secret
File Server
Standard
Workaround Procedures
3. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Control
Data Recovery
Botnet
Revocation
4. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Electronic Vaulting
Electrostatic Discharge
Application Programming Interface
Pervasive Computing and Mobile Computing Devices
5. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Business Interruption Insurance
Directive
Work Factor
Recovery Period
6. The level and label given to an individual for the purpose of compartmentalization
Security Clearance
Capability Tables
System Life Cycle
Object Reuse
7. A subnetwork with storage devices servicing all servers on the attached network.
CPU Cache
Elements of Negligence
Storage Area Network (SAN)
Shadowing (file shadowing)
8. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Keystroke Logging
Hacker
Warm Site
Network Attached Storage (NAS)
9. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Binary
Byte Level Deletion
Mandatory
Hard Disk
10. Outputs within a given function are the same result
Pervasive Computing and Mobile Computing Devices
Archival Data
User Mode (problem or program state)
Collisions
11. A mobilized resource purchased or contracted for the purpose of business recovery.
Side Channel Attack
Cipher Text
Mobile Recovery
DR Or BC Coordinator
12. Recovery alternative which includes cold site and some equipment and infrastructure is available
Uninterruptible Power Supply (UPS)
Twisted Pair
Warm Site
Object Reuse
13. A temporary public file to inform others of a compromised digital certificate
Certificate Revocation List (CRL)
Atomicity
Packet Filtering
Procedure
14. To set the clearance of a subject or the classification of an object
Encipher
3 Types of harm Addressed in computer crime laws
Labeling
Confidence Value
15. Eight bits.
Infrastructure
Data Hiding
Detection
Byte
16. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Standalone Test
Multi-Party Control
Forensic Copy
Firmware
17. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Orange Book B1 Classification
Prevention
Bit
Orange Book D Classification
18. Trading one for another
Logic Bomb
Substitution
Analysis
Inheritance
19. Narrow scope examination of a system
Business Continuity Planning (BCP)
Virus
Targeted Testing
Consistency
20. Return to a normal state
TCSEC (Orange Book)
Recovery
Threats
TIFF (Tagged Image File Format)
21. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Walk Though
Proxies
Quantitative Risk Analysis
Alternate Site
22. A process state - to be either be unable to run waiting for an external event or terminated
Bit
Stopped
Content Dependent Access Control
SQL Injection
23. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Failure Modes and Effect Analysis (FEMA)
Structured Walk-Through Test
File Sharing
Deletion
24. A device that converts between digital and analog representation of data.
Database Replication
Business Interruption Insurance
Modems
Journaling
25. Requirement of access to data for a clearly defined purpose
Need-To-Know
Enticement
Fault
Business Continuity Planning (BCP)
26. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Distributed Denial Of Service
Classification Scheme
Storage Area Network (SAN)
Corrective
27. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Mobile Recovery
Shift Cipher (Caesar)
Critical Infrastructure
Risk Assessment / Analysis
28. To know more than one job
Cold Site
Open Mail Relay Servers
Metadata
Cross Training
29. Something that happened
Multi-Programming
Event
Criminal Law
Deadlock
30. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Capability Tables
Criminal Law
Security Kernel
Degauss
31. A basic level of network access control that is based upon information contained in the IP packet header.
Shielding
Pointer
Packet Filtering
Fire Suppression
32. Pertaining to law - verified as real
Mandatory Vacations
Authentic
File Server
Classification Scheme
33. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Protection
Workaround Procedures
Faraday Cage/ Shield
Picking
34. Employment education done once per position or at significant change of function
Job Training
Administrative
Ring Protection
Incident Response Team
35. Memory management technique which allows subjects to use the same resource
Hot Spares
Multi-Party Control
Non-Interference
Sharing
36. Just enough access to do the job
Mobile Site
Least Privilege
Electromagnetic Interference (EMI)
Processes are Isolated By
37. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
MOM
Masquerading
Business Continuity Planning (BCP)
Mobile Recovery
38. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Substitution
Confidence Value
Emanations
Hot Spares
39. Momentary loss of power
Fault
Data Leakage
Cookie
ff Site
40. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Change Control
Copyright
Backup
Administrative Laws
41. A state where two subjects can access the same object without proper mediation
Race Condition
Work Factor
Full-Interruption test
Brute Force
42. A system designed to prevent unauthorized access to or from a private network.
Capability Tables
Non-Interference
Primary Storage
Firewall
43. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Fire Suppression
Network Attached Storage (NAS)
Life Cycle of Evidence
Structured Walk-Through Test
44. For PKI - to have more than one person in charge of a sensitive function
Inference
Digital Certificate
Critical Functions
Multi-Party Control
45. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Accreditation
Disaster Recovery Teams (Business Recovery Teams)
Business Continuity Planning (BCP)
Phishing
46. The principles a person sets for themselves to follow
Elements of Negligence
Ethics
Compartmentalize
Discretionary
47. To reduce sudden rises in current
Business Impact Analysis
Deadlock
Surge Suppressor
TEMPEST
48. The connection between a wireless and wired network.
Inheritance
Contingency Plan
Access Point
Shielding
49. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Cross-Site Scripting
Bollard
Discretionary Access Control (DAC)
Substitution
50. A form of data hiding which protects running threads of execution from using each other's memory
2-Phase Commit
Process Isolation
Database Replication
Log