SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Virtual Memory
Tapping
Countermeasure
Business Recovery Team
2. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Byte Level Deletion
File Server
Mitigate
CPU Cache
3. Of a system without prior knowledge by the tester or the tested
Detection
Tort
Double Blind Testing
Threats
4. A choice in risk management - to implement a control that limits or lessens negative effects
Incident Handling
Modems
Mitigate
Covert Channel
5. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Accurate
False Negative
Emergency Procedures
Checksum
6. Line noise that is superimposed on the supply circuit.
Transients
File Server
Liability
Disaster Recovery Tape
7. Return to a normal state
Recovery
Disaster Recovery Tape
Embedded
Countermeasure
8. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Near Site
Brownout
Rogue Access Points
Privacy Laws
9. Inappropriate data
Keyed-Hashing For Message Authentication
Malformed Input
Event
Mandatory Access Control (MAC)
10. People protect their domain
Class
Multi-Programming
Code
Territoriality
11. Potentially retrievable data residue that remains following intended erasure of data.
Remote Journaling
User
Control
Remanence
12. A technology that reduces the size of a file.
Object Oriented Programming (OOP)
Key Clustering
Compression
Ethics
13. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Walk Though
Injection
Source Routing Exploitation
5 Rules Of Evidence
14. Uses two or more legal systems
Tar Pits
Job Training
Business Interruption
Mixed Law System
15. Periodic - automatic and transparent backup of data in bulk.
Inheritance
Deletion
Electronic Vaulting
Object Oriented Programming (OOP)
16. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Containment
Criminal Law
Business Continuity Steering Committee
Locard's Principle
17. To reduce fire
Electromagnetic Interference (EMI)
Threats
Fire Suppression
Interpreter
18. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Firewall
Twisted Pair
Brouter
False (False Positive)
19. A risk assessment method - intrinsic value
Emergency Operations Center (EOC)
Computer System Evidence
Qualitative
User Mode (problem or program state)
20. The property that data meet with a priority expectation of quality and that the data can be relied upon.
E-Mail Spoofing
Inference
Remanence
Data Integrity
21. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Checkpoint
Failure Modes and Effect Analysis (FEMA)
Simulation
Reference Monitor
22. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. A device that sequentially switches multiple analog inputs to the output.
Multiplexers
Fire Detection
Non-Discretionary Access Control
Interference (Noise)
24. A unit of execution
Non-Interference
Fire Prevention
Buffer Overflow
Threads
25. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Virus
Worldwide Interoperability for Microwave Access (WI-MAX )
Orange Book C Classification
Acronym for American Standard Code for Information Interchange (ASCII)
26. Intellectual property protection for an invention
Administrative Access Controls
Patent
Life Cycle of Evidence
Orange Book C Classification
27. A control after attack
Brute Force
Packet Filtering
Countermeasure
Waterfall
28. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
TNI (Red Book)
Orange Book D Classification
Warm Site
Administrative Access Controls
29. High frequency noise
Service Bureau
Discretionary Access Control (DAC)
Electromagnetic Interference (EMI)
Incident
30. Recovery alternative which includes cold site and some equipment and infrastructure is available
Debriefing/Feedback
Business Continuity Planning (BCP)
Security Blueprint
Warm Site
31. Collection of data on business functions which determines the strategy of resiliency
Denial Of Service
Codec
Business Impact Assessment (BIA)
Log
32. All of the protection mechanism in a computer system
Centralized Access Control Technologies
Classification Scheme
Trusted Computing Base
MOM
33. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Fraggle
Plaintext
Authentic
Shielding
34. Written internalized or nationalized norms that are internal to an organization
Noise
Embedded
Control
Standard
35. Mediation of covert channels must be addressed
Forward Recovery
Information Flow Model
Embedded
Hearsay
36. An individuals conduct that violates government laws developed to protect the public
Access Control Lists
Resumption
Atomicity
Criminal Law
37. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Concatenation
Trusted Computing Base
Classification Scheme
Embedded Systems
38. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
Damage Assessment
Network Attached Storage (NAS)
Multi-Programming
Administrative Laws
39. Security policy - procedures - and compliance enforcement
Botnet
Voice Over IP (VOIP)
Examples of non-technical security components
Electromagnetic Interference (EMI)
40. A control before attack
Administrative Access Controls
Mandatory
Safeguard
Certificate Revocation List (CRL)
41. A hash that has been further encrypted with a symmetric algorithm
Mitigate
Keyed-Hashing For Message Authentication
Kerberos
Data Diddler
42. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Network Attached Storage (NAS)
Alternate Site
Redundant Array Of Independent Drives (RAID)
Man-In-The-Middle Attack
43. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Stopped
Plain Text
Containment
Classification
44. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Multi-Core
Deleted File
Plaintext
Data Marts
45. Renders the record inaccessible to the database management system
Record Level Deletion
Recovery Strategy
Classification
Alternate Site
46. Reprogrammable basic startup instructions
File Server
Firmware
Reciprocal Agreement
Off-Site Storage
47. Pertaining to law - accepted by a court
Orange Book D Classification
Test Plan
Access Point
Admissible
48. Methodical research of an incident with the purpose of finding the root cause
Administrative
Blind Testing
Investigation
Crisis
49. DoS - Spoofing - dictionary - brute force - wardialing
Risk Assessment / Analysis
Alternate Site
Relocation
Access Control Attacks
50. A running key using a random key that is never used again
One Time Pad
Covert Channel
Alert
Total Risk