SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technology that reduces the size of a file.
Databases
Threats
Interference (Noise)
Compression
2. The guardian of asset(s) - a maintenance activity
Dangling Pointer
Custodian
Non-Interference
Residual Risk
3. With enough computing power trying all possible combinations
Business Recovery Team
Brute Force
Shielding
Intrusion Detection Systems
4. A subnetwork with storage devices servicing all servers on the attached network.
Fault Tolerance
Orange Book B1 Classification
Tort
Storage Area Network (SAN)
5. To jump to a conclusion
Entrapment
Inference
Architecture
System Downtime
6. Mediation of subject and object interactions
Access Control
Total Risk
Multi-Party Control
Tar Pits
7. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Life Cycle of Evidence
Triage
Denial Of Service
Control
8. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Mobile Recovery
Off-Site Storage
Exercise
ITSEC
9. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Fault Tolerance
Teardrop
Concatenation
User
10. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Consistency
Job Rotation
Investigation
Multilevel Security System
11. Lower frequency noise
Safeguard
Radio Frequency Interference (RFI)
Object
Botnet
12. A device that converts between digital and analog representation of data.
Data Backups
Modems
Debriefing/Feedback
Fraggle
13. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
Database Replication
Chain of Custody
Plaintext
TIFF (Tagged Image File Format)
14. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Strategic
Data Dictionary
Distributed Denial Of Service
File Shadowing
15. Methodical research of an incident with the purpose of finding the root cause
Protection
Investigation
Trademark
Operational
16. To create a copy of data as a precaution against the loss or damage of the original data.
Encryption
Centralized Access Control Technologies
Attacker (Black hat - Hacker)
Backup
17. The first rating that requires security labels
Threats
Steganography
Orange Book B1 Classification
Structured Walk-Through Test
18. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Contingency Plan
Exercise
Remote Journaling
Remote Journaling
19. Unsolicited commercial email
Mandatory Vacations
Polymorphism
Spam
Common Criteria
20. To collect many small pieces of data
Aggregation
Sharing
Adware
Due Diligence
21. To stop damage from spreading
Rootkit
Embedded
Containment
Tort
22. Highest level of authority at EOC with knowledge of the business process and the resources available
Routers
On-Site
Security Clearance
Incident Manager
23. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Due Care
Guidelines
Business Interruption
Routers
24. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
IP Address Spoofing
Data Integrity
Shielding
Brute Force
25. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Mantrap (Double Door System)
Administrative Laws
Residual Data
Honeynet
26. Most granular organization of controls
Protection
Locard's Principle
Control Category
Database Replication
27. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Processes are Isolated By
File Shadowing
Cross-Site Scripting
Event
28. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Botnet
Multi-Processor
Deleted File
Detective
29. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Business Recovery Team
System Downtime
Access Control Lists
JPEG (Joint Photographic Experts Group)
30. Control category- to record an adversary's actions
Quantitative
Network Attached Storage (NAS)
Detective
Parallel Test
31. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
False Attack Stimulus
Application Programming Interface
Administrative
Computer System Evidence
32. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Mirroring
Data Leakage
CobiT
Authentic
33. A choice in risk management - to implement a control that limits or lessens negative effects
Mitigate
Hard Disk
Bollard
Mandatory Vacations
34. Provides a physical cross connect point for devices.
Procedure
Custodian
Patch Panels
Governance
35. A back up type - where the organization has excess capacity in another location.
Distributed Processing
Compensating
Interception
Event
36. Real-time - automatic and transparent backup of data.
Centralized Access Control Technologies
Remote Journaling
Access Control
Metadata
37. A process state - to be executing a process on the CPU
Interpreter
Qualitative
Metadata
Running
38. Trading one for another
Substitution
Keystroke Logging
Business Records
Triage
39. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Surveillance
Covert Channel
Cryptanalysis
Burn
40. Reduction of voltage by the utility company for a prolonged period of time
Control
Business Records
Object Reuse
Brownout
41. A set of laws that the organization agrees to be bound by
Business Interruption
Replication
Digital Signature
Administrative Law
42. The collection and summation of risk data relating to a particular asset and controls for that asset
Certification Authority
Cookie
High-Risk Areas
Risk Assessment
43. Substitution at the word or phrase level
Code
Orange Book D Classification
Strong Authentication
Complete
44. RADIUS - TACACS+ - Diameter
Residual Risk
Data Diddler
Radio Frequency Interference (RFI)
Centralized Access Control Technologies
45. Unused storage capacity
Substitution
Threats
Slack Space
Byte
46. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Multilevel Security System
Civil Law
Fire Suppression
Data Owner
47. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Source Routing Exploitation
Botnet
Copyright
Business Recovery Team
48. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Disaster Recovery Tape
Entrapment
Slack Space
Redundant Array Of Independent Drives (RAID)
49. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
ff Site
Data Integrity
TCSEC (Orange Book)
Administrative Laws
50. Some systems are actually run at the alternate site
File Extension
Data Dictionary
War Dialing
Parallel Test