SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hitting a filed down key in a lock with a hammer to open without real key
Non-Discretionary Access Control
Examples of technical security components
Bumping
Denial Of Service
2. Potential danger to information or systems
Processes are Isolated By
2-Phase Commit
SQL Injection
Threats
3. Subjects will not interact with each other's objects
Safeguard
True Attack Stimulus
Race Condition
Non-Interference
4. Summary of a communication for the purpose of integrity
Message Digest
Security Kernel
Strong Authentication
Pointer
5. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Simulation Test
Code
Mantrap (Double Door System)
Legacy Data
6. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Polyalphabetic
Governance
CobiT
Notification
7. Individuals and departments responsible for the storage and safeguarding of computerized data.
Secondary Storage
Encryption
Data Custodian
System Life Cycle
8. Unchecked data which spills into another location in memory
Structured Walk-Through Test
Isolation
Test Plan
Buffer Overflow
9. To segregate for the purposes of labeling
Information Flow Model
Compartmentalize
Injection
Top Secret
10. A passive network attack involving monitoring of traffic.
Eavesdropping
Forensic Copy
Key Space
Data Diddler
11. Outputs within a given function are the same result
Bit
Checksum
Interference (Noise)
Collisions
12. Prolonged loss of commercial power
Acronym for American Standard Code for Information Interchange (ASCII)
Application Programming Interface
Blackout
Cryptology
13. Hiding the fact that communication has occurred
Cold Site
Data Recovery
False Attack Stimulus
Steganography
14. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Territoriality
Vital Record
Pointer
Voice Over IP (VOIP)
15. Physical description on the exterior of an object that communicates the existence of a label
Concatenation
Sequence Attacks
Marking
Digital Certificate
16. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Active Data
High-Risk Areas
Microwave
Marking
17. Forgery of the sender's email address in an email header.
E-Mail Spoofing
Integrated Test
Spam
BCP Testing Drills and Exercises
18. Business and technical process of applying security software updates in a regulated periodic way
Class
Patch Management
Recovery Strategy
Remanence
19. Intellectual property protection for marketing efforts
Checklist Test (desk check)
Spiral
Data Integrity
Trademark
20. Control category- to discourage an adversary from attempting to access
Interception
Machine Language (Machine Code)
Electronic Vaulting
Deterrent
21. An alert or alarm that is triggered when no actual attack has taken place
False (False Positive)
Blind Testing
Algorithm
Non-Interference
22. A process state - to be executing a process on the CPU
Architecture
Preemptive
Patch Management
Running
23. Pertaining to law - lending it self to one side of an argument
Data Leakage
Compartmentalize
Convincing
Confidence Value
24. An encryption method that has a key as long as the message
Patch Management
Interpreter
False (False Positive)
Running Key
25. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Infrastructure
Reference Monitor
Phishing
Restoration
26. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Trademark
Administrative Laws
War Dialing
Stopped
27. Threats x Vulnerability x Asset Value = Total Risk
Total Risk
Incident
Brouter
Orange Book B1 Classification
28. A shield against leakage of electromagnetic signals.
Preemptive
Simulation Test
Spam
Faraday Cage/ Shield
29. State of computer - to be running a process
Computer System Evidence
Buffer Overflow
Operating
Business Recovery Team
30. Dedicated fast memory located on the same board as the CPU
CPU Cache
Access Point
Concatenation
Hearsay Evidence
31. Searching for wireless networks in a moving car.
Administrative Law
Alternate Site
Marking
War Driving
32. A protocol for the efficient transmission of voice over the Internet
ISO/IEC 27002
Voice Over IP (VOIP)
Keyed-Hashing For Message Authentication
Trademark
33. Less granular organization of controls -
Information Technology Security Evaluation Criteria - ITSEC
One Time Pad
Control Type
False Negative
34. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Protection
Notification
Standalone Test
Containment
35. Unauthorized wireless network access device.
True Attack Stimulus
Running Key
Private Branch Exchange (PBX)
Rogue Access Points
36. Inference about encrypted communications
Restoration
Embedded
Side Channel Attack
Remote Journaling
37. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Malformed Input
Identification
Discretionary Access Control (DAC)
Certificate Revocation List (CRL)
38. Methodical research of an incident with the purpose of finding the root cause
Mantrap (Double Door System)
Investigation
Orange Book A Classification
UPS
39. Eavesdropping on network communications by a third party.
Metadata
Cookie
Sniffing
Simulation Test
40. Recording the Who What When Where How of evidence
HTTP Response Splitting
Cryptology
Chain Of Custody
Surge Suppressor
41. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Evidence
Archival Data
Byte Level Deletion
Threads
42. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Digital Signature
Threat Agent
Near Site
Cryptography
43. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Governance
Critical Records
Disk Mirroring
Mixed Law System
44. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Fault Tolerance
Vital Record
Tar Pits
Spyware
45. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Cross Training
Orange Book B2 Classification
Deterrent
Database Shadowing
46. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Cross Certification
False (False Positive)
Public Key Infrastructure (PKI)
Discretionary Access Control (DAC)
47. People protect their domain
Man-In-The-Middle Attack
Territoriality
Lattice
Site Policy
48. A failure of an IDS to detect an actual attack
False Negative
State Machine Model
Content Dependent Access Control
Trusted Computing Base
49. A race condition where the security changes during the object's access
Twisted Pair
Compiler
Mobile Site
Time Of Check/Time Of Use
50. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Access Control Lists
ITSEC
Need-To-Know
Least Privilege