SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Disaster Recovery Tape
ITSEC
Orange Book C2 Classification
Strong Authentication
2. Pertaining to law - lending it self to one side of an argument
Discretionary
Consistency
Convincing
Tracking
3. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Strategic
Basics Of Secure Design
Technical Access Controls
Man-In-The-Middle Attack
4. A choice in risk management - to convince another to assume risk - typically by payment
Fault Tolerance
Transfer
Restoration
Analysis
5. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Alert
Civil Law
Asymmetric
High-Risk Areas
6. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Cross-Site Scripting
ITSEC
Administrative
Site Policy Awareness
7. A process state - (blocked) needing input before continuing
Wait
Bridge
Byte
Preemptive
8. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Evidence
Critical Records
E-Mail Spoofing
Buffer Overflow
9. Converts source code to an executable
Method
Hacker
Compiler
Remote Journaling
10. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Compiler
Recovery Strategy
Risk Mitigation
11. OOP concept of a template that consist of attributes and behaviors
Job Training
Class
Chain of Custody
Key Clustering
12. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
Control
TNI (Red Book)
Ethics
Chain Of Custody
13. Something that happened
Qualitative
Overlapping Fragment Attack
Examples of technical security components
Event
14. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Cryptography
Switches
File Shadowing
Overlapping Fragment Attack
15. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Memory Management
Orange Book D Classification
Fraggle
Deletion
16. Renders the file inaccessible to the operating system - available to reuse for data storage.
Collisions
File Server
File Level Deletion
Interference (Noise)
17. Potential danger to information or systems
Threats
Hearsay
Storage Area Network (SAN)
Masked/Interruptible
18. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Firmware
Threats
Declaration
Fraggle
19. A electronic attestation of identity by a certificate authority
Ethics
Remote Journaling
Digital Certificate
Trademark
20. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Interception
Mandatory
Slack Space
Hard Disk
21. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Deleted File
Rollback
CPU Cache
Control Category
22. Malware that makes small random changes to many data points
Orange Book C2 Classification
Operational
Civil Law
Data Diddler
23. A device that provides the functions of both a bridge and a router.
Hearsay
Brouter
Patent
Private Branch Exchange (PBX)
24. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Multi-Processor
Teardrop
Detection
Remote Journaling
25. A passive network attack involving monitoring of traffic.
Moore's Law
Eavesdropping
Redundant Servers
Desk Check Test
26. Used to code/decode a digital data stream.
File
Codec
Payload
Storage Area Network (SAN)
27. For PKI - to have more than one person in charge of a sensitive function
Multi-Party Control
Mobile Recovery
One Time Pad
Accreditation
28. A telephone exchange for a specific office or business.
Private Branch Exchange (PBX)
Protection
Transfer
Transients
29. Pertaining to law - verified as real
Brownout
Interpreter
Authentic
Convincing
30. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Common Law
Interception
Fraggle
Ethics
31. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
ISO/IEC 27001
Operational Test
Fire Detection
Residual Risk
32. Autonomous malware that requires a flaw in a service
Birthday Attack
Worm
Critical Functions
Coaxial Cable
33. Moving letters around
Full Test (Full Interruption)
Mandatory
ITSEC
Permutation /Transposition
34. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Key Clustering
Rootkit
Data Marts
Analysis
35. The collection and summation of risk data relating to a particular asset and controls for that asset
Multi-Processor
Business Continuity Steering Committee
Risk Assessment
Microwave
36. Two different keys decrypt the same cipher text
Key Clustering
Residual Risk
One Time Pad
Radio Frequency Interference (RFI)
37. People protect their domain
Initialization Vector
Territoriality
Life Cycle of Evidence
Activation
38. Evidence must be: admissible - authentic - complete - accurate - and convincing
Hearsay
Firewalls
Emergency
5 Rules Of Evidence
39. The study of cryptography and cryptanalysis
Compiler
Inheritance
Cryptology
Encapsulation
40. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Business Interruption
Detective
Business Interruption Insurance
ISO/IEC 27002
41. A design methodology which addresses risk early and often
Orange Book B1 Classification
Spiral
Shielding
Logic Bomb
42. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Digital Signature
Ring Protection
ISO/IEC 27001
Tort
43. A control before attack
Safeguard
Countermeasure
True Attack Stimulus
Compression
44. Collection of data on business functions which determines the strategy of resiliency
Radio Frequency Interference (RFI)
Residual Risk
Application Programming Interface
Business Impact Assessment (BIA)
45. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Modification
Vulnerability
Emergency Operations Center (EOC)
Life Cycle of Evidence
46. A software design technique for abstraction of a process
Data Hiding
Inheritance
Data Leakage
Exposure
47. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Quantitative
JPEG (Joint Photographic Experts Group)
Redundant Servers
Evidence
48. Pertaining to law - no omissions
Logic Bomb
Virtual Memory
Transfer
Complete
49. The chance that something negative will occur
Recovery Time Objectives
Structured Walkthrough
Risk
Access Control Lists
50. System mediation of access with the focus on the context of the request
Information Flow Model
Content Dependent Access Control
Packet Filtering
Hearsay