SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two certificate authorities that trust each other
Denial Of Service
Cross Certification
Quantitative Risk Analysis
System Downtime
2. Forgery of the sender's email address in an email header.
Physical Tampering
E-Mail Spoofing
Containment
Near Site
3. To stop damage from spreading
Kernel
Containment
Redundant Array Of Independent Drives (RAID)
Data Dictionary
4. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Governance
Deterrent
Security Clearance
Remote Journaling
5. A backup of data located where staff can gain access immediately
Security Blueprint
Fault Tolerance
Permutation /Transposition
On-Site
6. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Encryption
Fault
Chain Of Custody
Confidence Value
7. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Mirroring
Waterfall
Intrusion Prevention Systems
Business Recovery Timeline
8. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Multi-Processor
Risk Mitigation
Data Leakage
Discretionary
9. A temporary public file to inform others of a compromised digital certificate
Data Recovery
False (False Positive)
Certificate Revocation List (CRL)
Concentrator
10. A program with an inappropriate second purpose
Trojan Horse
Full-Interruption test
Patch Panels
Brouter
11. A record that must be preserved and available for retrieval if needed.
Vital Record
Surge
Electronic Vaulting
Guidelines
12. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Cross Training
ITSEC
Contingency Plan
Microwave
13. Program instructions based upon the CPU's specific architecture
Sniffing
Machine Language (Machine Code)
Cookie
Enticement
14. Provides a physical cross connect point for devices.
Critical Records
Patch Panels
Public Key Infrastructure (PKI)
Non-Discretionary Access Control
15. A backup type which creates a complete copy
Replication
Access Control Matrix
Multi-Core
Legacy Data
16. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Man-In-The-Middle Attack
Database Replication
Phishing
Redundant Array Of Independent Drives (RAID)
17. Guidelines within an organization that control the rules and configurations of an IDS
Non-Interference
Site Policy
Data Marts
Keystroke Logging
18. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Security Blueprint
Data Dictionary
High-Risk Areas
Network Attached Storage (NAS)
19. For PKI - to have more than one person in charge of a sensitive function
Liability
Control
Multi-Party Control
File Sharing
20. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Shift Cipher (Caesar)
Analysis
Parallel Test
Polymorphism
21. A device that converts between digital and analog representation of data.
Residual Risk
Modems
Need-To-Know
Blackout
22. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Non-Discretionary Access Control
System Life Cycle
Threat Agent
Masked/Interruptible
23. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Forensic Copy
Sag/Dip
Quantitative Risk Analysis
Identification
24. Methodical research of an incident with the purpose of finding the root cause
Investigation
Proxies
Code
Virtual Memory
25. The level and label given to an individual for the purpose of compartmentalization
Security Clearance
Deleted File
Multi-Programming
Database Replication
26. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Marking
User
Source Routing Exploitation
Emanations
27. Encryption system using shared key/private key/single key/secret key
Authorization
Symmetric
Mitigate
Transfer
28. Of a system without prior knowledge by the tester or the tested
Metadata
High-Risk Areas
Double Blind Testing
Fire Prevention
29. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Noise
Structured Walk-Through Test
ISO/IEC 27001
Non-Interference
30. A process state - to be either be unable to run waiting for an external event or terminated
Surge Suppressor
Discretionary Access Control (DAC)
Stopped
Intrusion Detection Systems
31. Sudden rise in voltage in the power supply.
Surge
Rootkit
Stopped
Algorithm
32. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Resumption
Certification Authority
Trusted Computing Base
Business Interruption Insurance
33. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Information Technology Security Evaluation Criteria - ITSEC
Control Category
ISO/IEC 27002
Kerckhoff's Principle
34. Requirement of access to data for a clearly defined purpose
Honeynet
Firewall
Operating
Need-To-Know
35. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. Potentially compromising leakage of electrical or acoustical signals.
Aggregation
Emanations
Honeypot
Operational
37. A backup type - for databases at a point in time
Tracking
Civil Or Code Law
Shadowing (file shadowing)
Slack Space
38. To move from location to location - keeping the same function
Ring Protection
Orange Book B2 Classification
Operating
Job Rotation
39. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Technical Access Controls
TEMPEST
System Life Cycle
Forensic Copy
41. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Open Mail Relay Servers
Labeling
Fragmented Data
Polymorphism
42. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Evidence
Compiler
Botnet
Bollard
43. Effort/time needed to overcome a protective measure
Operational Exercise
BCP Testing Drills and Exercises
Work Factor
File Extension
44. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Multi-Programming
Governance
Network Attached Storage (NAS)
Private Branch Exchange (PBX)
45. Unsolicited commercial email
Vital Record
Backup
Directive
Spam
46. A control after attack
Countermeasure
Architecture
Mandatory Vacations
Chain of Custody
47. Communication of a security incident to stakeholders and data owners.
Structured Walkthrough
Notification
Warm Site
Application Programming Interface
48. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Packet Filtering
File Shadowing
Orange Book D Classification
Business Continuity Planning (BCP)
49. Unauthorized access of network devices.
Central Processing Unit (CPU)
Residual Risk
Physical Tampering
Work Factor
50. Low level - pertaining to planning
Tactical
Contingency Plan
Evidence
Denial Of Service