SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The level and label given to an individual for the purpose of compartmentalization
Security Clearance
Sharing
Disaster Recovery Plan
Centralized Access Control Technologies
2. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Checklist Test (desk check)
File Server
Concentrator
Authentic
3. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Access Control Attacks
Redundant Array Of Independent Drives (RAID)
Call Tree
Compartmentalize
4. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Remote Journaling
2-Phase Commit
Compensating
ISO/IEC 27001
5. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Non-Repudiation
High-Risk Areas
Hacker
Top Secret
6. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Acronym for American Standard Code for Information Interchange (ASCII)
Crisis
Sharing
Access Control Lists
7. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Fragmented Data
Disaster Recovery Teams (Business Recovery Teams)
DR Or BC Coordinator
Compiler
8. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Event
Acronym for American Standard Code for Information Interchange (ASCII)
Sag/Dip
Service Bureau
9. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Rootkit
IP Address Spoofing
Resumption
Masquerading
10. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Due Care
Walk Though
Data Integrity
Compiler
11. Return to a normal state
Incident Response Team
Transients
Recovery
Eavesdropping
12. For PKI - to have more than one person in charge of a sensitive function
IP Address Spoofing
Multi-Party Control
Switches
Firewall
13. Outputs within a given function are the same result
Running
Mixed Law System
Mission-Critical Application
Collisions
14. Narrow scope examination of a system
Replication
Targeted Testing
Standalone Test
Inrush Current
15. Uncheck data input which results in redirection
HTTP Response Splitting
Malformed Input
Activation
Bridge
16. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Recovery
Public Key Infrastructure (PKI)
Control Type
Alert/Alarm
17. A hash that has been further encrypted with a symmetric algorithm
Keyed-Hashing For Message Authentication
TCSEC (Orange Book)
Salami
Cross Training
18. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Hijacking
Picking
Desk Check Test
ISO/IEC 27002
19. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Disaster Recovery Plan
Storage Area Network (SAN)
Workaround Procedures
Business Continuity Program
20. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Notification
Examples of technical security components
Cryptanalysis
Elements of Negligence
21. Threats x Vulnerability x Asset Value = Total Risk
Isolation
Total Risk
Full Test (Full Interruption)
Disk Mirroring
22. Controls deployed to avert unauthorized and/or undesired actions.
Vulnerability
Prevention
User Mode (problem or program state)
Civil Or Code Law
23. A backup type - for databases at a point in time
2-Phase Commit
Integrated Test
Shadowing (file shadowing)
Simulation
24. Deals with discretionary protection
Critical Records
Criminal Law
Orange Book C Classification
Supervisor Mode (monitor - system - privileged)
25. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
War Driving
File Sharing
Multi-Party Control
Site Policy Awareness
26. Written internalized or nationalized norms that are internal to an organization
Standard
HTTP Response Splitting
Secondary Storage
Polymorphism
27. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Picking
Kernel
Shielding
Permutation /Transposition
28. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Tort
Cryptanalysis
Control Type
Aggregation
29. Autonomous malware that requires a flaw in a service
Forensic Copy
Emergency Operations Center (EOC)
Firewalls
Worm
30. The connection between a wireless and wired network.
Access Point
ISO/IEC 27002
Running
Notification
31. An attack involving the hijacking of a TCP session by predicting a sequence number.
Polymorphism
Convincing
Sequence Attacks
Inference
32. Program instructions based upon the CPU's specific architecture
Electrostatic Discharge
Centralized Access Control Technologies
Compensating
Machine Language (Machine Code)
33. Recovery alternative - complete duplication of services including personnel
Denial Of Service
Mirrored Site
Rollback
Kernel
34. Location to perform the business function
Education
Content Dependent Access Control
Alternate Site
Technical Access Controls
35. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Vulnerability
Administrative
Information Risk Management (IRM)
Disk Mirroring
36. Object based description of a system or a collection of resources
Access Control Matrix
Databases
Orange Book C2 Classification
Physical Tampering
37. A backup of data located where staff can gain access immediately
Digital Signature
Distributed Denial Of Service
On-Site
Noise
38. Part of a transaction control for a database which informs the database of the last recorded transaction
Kerckhoff's Principle
Checkpoint
Checklist Test
Consistency
39. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Microwave
Off-Site Storage
Repeaters
Simulation
40. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
File Sharing
Smurf
User Mode (problem or program state)
Boot (V.)
41. Alerts personnel to the presence of a fire
Fire Detection
Protection
Least Privilege
SYN Flooding
42. A template for the designing the architecture
Investigation
Pervasive Computing and Mobile Computing Devices
Security Blueprint
Internal Use Only
43. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Distributed Denial Of Service
Data Hiding
Replication
TNI (Red Book)
44. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Tapping
Confidence Value
Checkpoint
File Sharing
45. Asymmetric encryption of a hash of message
Digital Signature
Primary Storage
Encapsulation
SQL Injection
46. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Concatenation
Pervasive Computing and Mobile Computing Devices
Checklist Test (desk check)
Business Interruption Insurance
47. An administrative unit or a group of objects and subjects controlled by one reference monitor
Firewall
Contact List
Security Domain
Bollard
48. Control category - more than one control on a single asset
Convincing
Compensating
Quantitative
Embedded Systems
49. With enough computing power trying all possible combinations
Hot Spares
Modems
Brute Force
IDS Intrusion Detection System
50. Wrong against society
Criminal Law
Stopped
Spiral
Authentic