SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recognition of an individual's assertion of identity.
Recovery
Record Level Deletion
Identification
Brownout
2. A covert storage channel on the file attribute
User Mode (problem or program state)
Control
Alternate Data Streams (File System Forks)
Electronic Vaulting
3. A trusted issuer of digital certificates
Certification Authority
Risk Mitigation
Malformed Input
CobiT
4. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Keystroke Logging
Contingency Plan
Multiplexers
Data Integrity
5. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Payload
Object Reuse
ff Site
Internal Use Only
6. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Orange Book B2 Classification
Archival Data
Certification Authority
Triage
7. Two different keys decrypt the same cipher text
Risk Assessment
Key Clustering
Control Type
Computer Forensics
8. To move from location to location - keeping the same function
Distributed Denial Of Service
Data Backups
Information Owner
Job Rotation
9. To load the first piece of software that starts a computer.
Symmetric
Boot (V.)
Compartmentalize
Waterfall
10. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Surge
Encryption
Reference Monitor
Initialization Vector
11. Collection of data on business functions which determines the strategy of resiliency
Authentic
Service Bureau
Business Impact Assessment (BIA)
Corrective
12. A process state - to be executing a process on the CPU
Layering
Life Cycle of Evidence
Running
Repeaters
13. An individuals conduct that violates government laws developed to protect the public
Criminal Law
Masquerading
Mirrored Site
Incident Handling
14. A back up type - where the organization has excess capacity in another location.
Multi-Processing
JPEG (Joint Photographic Experts Group)
Distributed Processing
Incident Response Team
15. Object reuse protection and auditing
Orange Book C2 Classification
Full-Interruption test
File
Full Test (Full Interruption)
16. A database that contains the name - type - range of values - source and authorization for access for each data element
Electrostatic Discharge
Data Dictionary
Access Control Matrix
Liability
17. Independent malware that requires user interaction to execute
Virus
Remanence
Key Escrow
Reciprocal Agreement
18. The hard drive
Simulation Test
File Sharing
Malformed Input
Secondary Storage
19. A Trojan horse with the express underlying purpose of controlling host from a distance
Trapdoors (Backdoors) (Maintenance Hooks)
Examples of technical security components
Remote Access Trojan
Incident Response
20. The principles a person sets for themselves to follow
E-Mail Spoofing
Residual Data
Ethics
Recovery Time Objectives
21. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. The technical and risk assesment of a system within the context of the operating environment
Certification
Multi-Processor
Cross Certification
Recovery Time Objectives
23. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Disaster Recovery Teams (Business Recovery Teams)
Machine Language (Machine Code)
Man-In-The-Middle Attack
Business Impact Assessment (BIA)
24. Evaluation of a system without prior knowledge by the tester
Modems
Blind Testing
Orange Book B2 Classification
Burn
25. Fault tolerance for power
Generator
Operating
Risk
Separation Of Duties
26. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
Plain Text
Executive Succession
Enticement
MOM
27. Summary of a communication for the purpose of integrity
UPS
Permutation /Transposition
Message Digest
Exposure
28. A mathematical tool for verifying no unintentional changes have been made
Binary
Kernel
Hacker
Checksum
29. A process state - to be either be unable to run waiting for an external event or terminated
Stopped
Business Impact Analysis
Criminal Law
Multilevel Security System
30. Indivisible - data field must contain only one value that either all transactions take place or none do
File Extension
Atomicity
Network Attached Storage (NAS)
IDS Intrusion Detection System
31. Someone who want to know how something works - typically by taking it apart
Hacker
Security Clearance
Durability
Alarm Filtering
32. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Maximum Tolerable Downtime (MTD)
Cross-Site Scripting
Information Technology Security Evaluation Criteria - ITSEC
Blind Testing
33. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Satellite
Checklist Test
Multilevel Security System
User Mode (problem or program state)
34. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Smurf
Compression
Byte Level Deletion
ITSEC
35. Sphere of influence
Activation
Waterfall
Domain
System Downtime
36. A state where two subjects can access the same object without proper mediation
SYN Flooding
Key Clustering
Encapsulation
Race Condition
37. Third party processes used to organize the implementation of an architecture
Structured Walkthrough
Critical Functions
Framework
Certification
38. OOP concept of a taking attributes from the original or parent
Centralized Access Control Technologies
Spyware
Fire Prevention
Inheritance
39. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Crisis
Administrative
Slack Space
Keyed-Hashing For Message Authentication
40. Return to a normal state
Recovery
Mock Disaster
Job Training
Quantitative Risk Analysis
41. A layer 2 device that used to connect two or more network segments and regulate traffic.
Detection
Switches
Due Diligence
Storage Area Network (SAN)
42. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Threats
Inrush Current
Reference Monitor
ff Site
43. OOP concept of a class's details to be hidden from object
Acronym for American Standard Code for Information Interchange (ASCII)
Legacy Data
Data Diddler
Encapsulation
44. A program that waits for a condition or time to occur that executes an inappropriate activity
Operational Impact Analysis
Eavesdropping
Logic Bomb
MOM
45. Quantity of risk remaining after a control is applied
Hot Spares
Residual Risk
Fire Suppression
Information Technology Security Evaluation Criteria - ITSEC
46. Pertaining to law - high degree of veracity
Accurate
Machine Language (Machine Code)
Contingency Plan
Business Continuity Planning (BCP)
47. Joining two pieces of text
Total Risk
Modems
ff Site
Concatenation
48. Using many alphabets
Polyalphabetic
Compression
Hot Spares
Burn
49. Intellectual property protection for an confidential and critical process
Polyalphabetic
Quantitative Risk Analysis
Trade Secret
Warm Site
50. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Checklist Test
Accreditation
Workaround Procedures
Fiber Optics