SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To break a business process into separate functions and assign to different people
Separation Of Duties
Checkpoint
Interpreter
Bumping
2. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
ISO/IEC 27002
Cross-Site Scripting
Ring Protection
One Time Pad
3. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Detection
Object Oriented Programming (OOP)
TCSEC (Orange Book)
One Time Pad
4. Intermediate level - pertaining to planning
Cross Certification
State Machine Model
File Level Deletion
Operational
5. Maximum tolerance for loss of certain business function - basis of strategy
Recovery Time Objectives
Parallel Test
Information Risk Management (IRM)
Recovery
6. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
File Level Deletion
Non-Discretionary Access Control
Orange Book D Classification
Steganography
7. A device that sequentially switches multiple analog inputs to the output.
System Downtime
Multiplexers
Qualitative
Alert
8. A program with an inappropriate second purpose
Security Kernel
Trojan Horse
Maximum Tolerable Downtime (MTD)
Eavesdropping
9. To set the clearance of a subject or the classification of an object
Accurate
Labeling
Isolation
Crisis
10. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Pervasive Computing and Mobile Computing Devices
Object
Packet Filtering
Chain of Custody
11. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Test Plan
Monitor
Process Isolation
Strong Authentication
12. Information about a particular data set
Fraggle
Metadata
Botnet
Intrusion Prevention Systems
13. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
State Machine Model
Concentrator
Site Policy Awareness
Masquerading
14. Final purpose or result
Fiber Optics
False (False Positive)
Payload
Malformed Input
15. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Forensic Copy
Encryption
Crisis
TNI (Red Book)
16. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Elements of Negligence
Data Backups
Cryptanalysis
Botnet
17. Line noise that is superimposed on the supply circuit.
Rogue Access Points
Transients
Fire Suppression
Recovery Strategy
18. OOP concept of a distinct copy of the class
Modification
Analysis
Object
Bit
19. Two certificate authorities that trust each other
Cross Certification
Cryptanalysis
Authentication
TCSEC (Orange Book)
20. Mitigation of system or component loss or interruption through use of backup capability.
Fault Tolerance
Distributed Denial Of Service
Mirrored Site
Object
21. An individuals conduct that violates government laws developed to protect the public
Interception
Multi-Core
Patch Management
Criminal Law
22. Claiming another's identity at a physical level
Hot Spares
Quantitative Risk Analysis
Masquerading
CPU Cache
23. Subject based description of a system or a collection of resources
Capability Tables
Transients
Initialization Vector
Access Control Lists
24. The core of a computer that calculates
Central Processing Unit (CPU)
Accurate
Workaround Procedures
Access Control Lists
25. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
TIFF (Tagged Image File Format)
SYN Flooding
Information Flow Model
Sag/Dip
26. Evaluation of a system without prior knowledge by the tester
Deleted File
Bridge
Blind Testing
Multi-Programming
27. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Structured Walk-Through Test
Cache
Compiler
Detection
28. A copy of transaction data - designed for querying and reporting
Mixed Law System
Data Warehouse
Kerckhoff's Principle
Infrastructure
29. Employment education done once per position or at significant change of function
Business Continuity Planning (BCP)
Job Training
Risk Mitigation
Business Impact Analysis
30. Potentially retrievable data residue that remains following intended erasure of data.
Ring Protection
Remanence
TEMPEST
Protection
31. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Highly Confidential
Multilevel Security System
Redundant Array Of Independent Drives (RAID)
Substitution
32. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Maximum Tolerable Downtime (MTD)
Ring Protection
Shift Cipher (Caesar)
Total Risk
33. Key
Operational
Cryptovariable
Phishing
Maximum Tolerable Downtime (MTD)
34. Sudden rise in voltage in the power supply.
Surge
Standalone Test
Chain of Custody
Incident Handling
35. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Framework
Business Unit Recovery
Legacy Data
Burn
36. Physical description on the exterior of an object that communicates the existence of a label
Proprietary
Trapdoors (Backdoors) (Maintenance Hooks)
Marking
Running Key
37. A database that contains the name - type - range of values - source and authorization for access for each data element
Overlapping Fragment Attack
Business Records
Concatenation
Data Dictionary
38. Controls for logging and alerting
Domain
Multi-Processor
Failure Modes and Effect Analysis (FEMA)
Intrusion Detection Systems
39. Measures followed to restore critical functions following a security incident.
Recovery
Aggregation
Need-To-Know
Cookie
40. Subjects will not interact with each other's objects
Administrative Access Controls
Double Blind Testing
Threats
Non-Interference
41. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
File Sharing
Technical Access Controls
Archival Data
Inference
42. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Processes are Isolated By
Risk
Interference (Noise)
Recovery Time Objectives
43. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
File Server
Alert
Chain Of Custody
Stopped
44. Wrong against society
Remote Access Trojan
Criminal Law
Incident Response Team
Trade Secret
45. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Buffer Overflow
Confidence Value
Memory Management
File Shadowing
46. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
False Negative
Qualitative
Code
Disaster Recovery Teams (Business Recovery Teams)
47. Amount of time for restoring a business process or function to normal operations without major loss
Mandatory Access Control (MAC)
Maximum Tolerable Downtime (MTD)
Eavesdropping
Cryptanalysis
48. To collect many small pieces of data
Coaxial Cable
Smurf
Aggregation
Inrush Current
49. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Exercise
Deadlock
Redundant Servers
Hard Disk
50. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Test Plan
Desk Check Test
Revocation
Trojan Horse