SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Containment
Wireless Fidelity (Wi-Fi )
Business Recovery Timeline
Non-Interference
2. OOP concept of an object at runtime
Instance
Mantrap (Double Door System)
File Server
Cookie
3. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Hash Function
Application Programming Interface
False (False Positive)
Certification
4. A one way - directed graph which indicates confidentiality or integrity flow
Threats
Substitution
Lattice
Relocation
5. Binary decision by a system of permitting or denying access to the entire system
Aggregation
Authentication
Standalone Test
Message Digest
6. A choice in risk management - to implement a control that limits or lessens negative effects
Technical Access Controls
Mitigate
Threats
Accreditation
7. Statistical probabilities of a collision are more likely than one thinks
Adware
Quantitative
Full Test (Full Interruption)
Birthday Attack
8. Mediation of subject and object interactions
Workaround Procedures
Authentic
Common Criteria
Access Control
9. A shield against leakage of electromagnetic signals.
Cryptology
Privacy Laws
On-Site
Faraday Cage/ Shield
10. To move from location to location - keeping the same function
Computer Forensics
Cache
Rollback
Job Rotation
11. Actions measured against either a policy or what a reasonable person would do
Due Diligence
Convincing
Open Mail Relay Servers
Emanations
12. Dedicated fast memory located on the same board as the CPU
Mantrap (Double Door System)
File
Reciprocal Agreement
CPU Cache
13. Hitting a filed down key in a lock with a hammer to open without real key
Sharing
Locard's Principle
Analysis
Bumping
14. Controls for logging and alerting
Security Blueprint
Education
Running
Intrusion Detection Systems
15. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Processes are Isolated By
Life Cycle of Evidence
Noise
Mock Disaster
16. Sphere of influence
Object
Domain
Cookie
Authentic
17. Act of scrambling the cleartext message by using a key.
Encipher
Modems
Ethics
Procedure
18. Forging of an IP address.
Executive Succession
IP Address Spoofing
2-Phase Commit
Denial Of Service
19. Responsibility of a user for the actions taken by their account which requires unique identification
Surge
Accountability
Operational Impact Analysis
Journaling
20. Prolonged loss of commercial power
Durability
Blackout
Service Bureau
The ACID Test
21. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Source Routing Exploitation
Hearsay Evidence
Operational Impact Analysis
3 Types of harm Addressed in computer crime laws
22. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Byte Level Deletion
Administrative
Incident Manager
Cryptovariable
23. One of the key benefits of a network is the ability to share files stored on the server among several users.
Call Tree
Log
File Sharing
Sampling
24. Natural occurrence in circuits that are in close proximity
Interference (Noise)
Business Records
Standalone Test
Alternate Data Streams (File System Forks)
25. Uncleared buffers or media
Notification
Orange Book B1 Classification
Object Reuse
Public Key Infrastructure (PKI)
26. A group or network of honeypots
Time Of Check/Time Of Use
Legacy Data
Honeynet
Data Custodian
27. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Crisis
Message Digest
Hot Spares
Examples of technical security components
28. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Warm Site
Preemptive
Hearsay Evidence
Structured Walkthrough
29. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Shift Cipher (Caesar)
Deleted File
Running Key
Data Backups
30. An attack involving the hijacking of a TCP session by predicting a sequence number.
Byte Level Deletion
Record Level Deletion
Sequence Attacks
UPS
31. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Remanence
Strong Authentication
Life Cycle of Evidence
Alert
32. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Policy
Computer Forensics
Byte Level Deletion
Recovery
33. Maximum tolerance for loss of certain business function - basis of strategy
Electronic Vaulting
Recovery Time Objectives
Supervisor Mode (monitor - system - privileged)
Containment
34. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Incident Response Team
Worldwide Interoperability for Microwave Access (WI-MAX )
Satellite
Sniffing
35. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
SQL Injection
Critical Infrastructure
Separation Of Duties
Identification
36. Unsolicited advertising software
Firewall
Keyed-Hashing For Message Authentication
Adware
Non-Interference
37. Return to a normal state
Detective
Recovery
Machine Language (Machine Code)
Application Programming Interface
38. Line by line translation from a high level language to machine code
Worm
Digital Certificate
Multi-Processor
Interpreter
39. An image compression standard for photographs
Authentic
Sampling
JPEG (Joint Photographic Experts Group)
Virtual Memory
40. People protect their domain
Quantitative Risk Analysis
Remanence
Territoriality
Source Routing Exploitation
41. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Risk Assessment / Analysis
CobiT
Data Owner
Business Impact Analysis
42. An asymmetric cryptography mechanism that provides authentication.
Fraggle
ff Site
Digital Signature
Redundant Array Of Independent Drives (RAID)
43. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Remanence
Off-Site Storage
Access Control Attacks
Structured Walkthrough
44. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Hacker
Deterrent
Data Owner
Emergency
45. OOP concept of a distinct copy of the class
Governance
Administrative Law
Safeguard
Object
46. A backup of data located where staff can gain access immediately
EMI
On-Site
Exposure
Classification
47. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Accreditation
Disaster Recovery Plan
Concentrator
Injection
48. A secure connection to another network.
Triage
Transfer
Gateway
Framework
49. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Open Mail Relay Servers
Journaling
Alternate Site
Orange Book A Classification
50. A mathematical tool for verifying no unintentional changes have been made
ISO/IEC 27002
Sharing
Checksum
Transfer