SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Written core statements that rarely change
Policy
Concatenation
Threats
Covert Channel
2. Short period of low voltage.
Threads
Disaster
Sag/Dip
Electromagnetic Interference (EMI)
3. Using small special tools all tumblers of the lock are aligned - opening the door
Picking
HTTP Response Splitting
Injection
User Mode (problem or program state)
4. Recovery alternative - short-term - high cost movable processing location
Mobile Site
Processes are Isolated By
Architecture
Intrusion Prevention Systems
5. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Degauss
Inference
False Attack Stimulus
Smurf
6. A control after attack
Cross-Site Scripting
Business Impact Assessment (BIA)
Adware
Countermeasure
7. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Mobile Recovery
Virus
Hub
Byte Level Deletion
8. System directed mediation of access with labels
Mandatory
Business Recovery Team
Open Mail Relay Servers
Detection
9. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Replication
Declaration
Symmetric
Orange Book D Classification
10. A technology that reduces the size of a file.
Legacy Data
Alternate Site
Compression
Deadlock
11. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Cache
Simulation Test
Marking
Surge Suppressor
12. A database that contains the name - type - range of values - source and authorization for access for each data element
Data Dictionary
Compression
Firmware
Bumping
13. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
Classification
Remote Journaling
Hot Spares
14. A back up type - where the organization has excess capacity in another location.
Distributed Processing
Denial Of Service
Security Kernel
Gateway
15. Business and technical process of applying security software updates in a regulated periodic way
Acronym for American Standard Code for Information Interchange (ASCII)
Patch Management
Multi-Programming
Supervisor Mode (monitor - system - privileged)
16. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
IP Fragmentation
Data Dictionary
Data Dictionary
Assembler
17. To stop damage from spreading
Adware
Containment
Noise
Wait
18. Abstract and mathematical in nature - defining all possible states - transitions and operations
State Machine Model
Hot Site
Substitution
Safeguard
19. Process whereby data is removed from active files and other data storage structures
Site Policy
Deletion
Patent
Plain Text
20. Controls for termination of attempt to access object
Intrusion Prevention Systems
Race Condition
Digital Signature
Metadata
21. Mitigation of system or component loss or interruption through use of backup capability.
Multi-Processor
Fault Tolerance
Certificate Revocation List (CRL)
File Level Deletion
22. A type of attack involving attempted insertion - deletion or altering of data.
Mandatory Vacations
True Attack Stimulus
Modification
Active Data
23. Renders the record inaccessible to the database management system
Disk Mirroring
Record Level Deletion
Business Interruption Insurance
Non-Repudiation
24. Asymmetric encryption of a hash of message
War Dialing
Attacker (Black hat - Hacker)
Rogue Access Points
Digital Signature
25. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Revocation
Interference (Noise)
Information Technology Security Evaluation Criteria - ITSEC
Business Interruption
26. More than one CPU on a single board
Digital Signature
Spyware
Multi-Core
Steganography
27. RADIUS - TACACS+ - Diameter
Checklist Test (desk check)
Key Management
Centralized Access Control Technologies
Birthday Attack
28. Location to perform the business function
Least Privilege
Business Impact Assessment (BIA)
Alternate Site
Emanations
29. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Alert/Alarm
Business Continuity Program
Incident Handling
Common Law
30. Narrow scope examination of a system
Targeted Testing
Cryptography
Mitigate
Modification
31. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Ring Protection
Qualitative
Hot Spares
Discretionary
32. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Hearsay Evidence
Burn
Contact List
Top Secret
33. Creation distribution update and deletion
Masked/Interruptible
Data Owner
Uninterruptible Power Supply (UPS)
Key Management
34. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Voice Over IP (VOIP)
2-Phase Commit
File Level Deletion
Alarm Filtering
35. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. Small data warehouse
Information Owner
Contingency Plan
Data Marts
Tar Pits
37. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Object Reuse
Fragmented Data
Worldwide Interoperability for Microwave Access (WI-MAX )
Data Recovery
38. Specific format of technical and physical controls that support the chosen framework and the architecture
Infrastructure
Patch Management
Attacker (Black hat - Hacker)
High-Risk Areas
39. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Integrated Test
Side Channel Attack
Classification Scheme
Test Plan
40. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Digital Signature
Administrative Access Controls
Restoration
Picking
41. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Control
Backup
Ring Protection
Chain Of Custody
42. A group or network of honeypots
Authentication
Overlapping Fragment Attack
Honeynet
Privacy Laws
43. Responsibility for actions
Event
Due Diligence
Liability
E-Mail Spoofing
44. Someone who wants to cause harm
Redundant Array Of Independent Drives (RAID)
Hash Function
Attacker (Black hat - Hacker)
Privacy Laws
45. Memory management technique which allows data to be moved from one memory address to another
Relocation
Remote Journaling
Site Policy Awareness
Targeted Testing
46. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Trade Secret
Journaling
Satellite
Qualitative
47. To set the clearance of a subject or the classification of an object
Hub
Labeling
Domain
Dangling Pointer
48. Control category- to give instructions or inform
Business Unit Recovery
Brute Force
Directive
Digital Signature
49. Granular decision by a system of permitting or denying access to a particular resource on the system
Denial Of Service
Authorization
Brute Force
Certificate Revocation List (CRL)
50. A Trojan horse with the express underlying purpose of controlling host from a distance
Layering
Reference Monitor
Remote Access Trojan
TIFF (Tagged Image File Format)