SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Reprogrammable basic startup instructions
Polymorphism
Triage
TNI (Red Book)
Firmware
2. To evaluate the current situation and make basic decisions as to what to do
Total Risk
EMI
Hot Site
Triage
3. Location to perform the business function
Workaround Procedures
Tactical
Chain of Custody
Alternate Site
4. False memory reference
Preemptive
Trapdoors (Backdoors) (Maintenance Hooks)
Administrative Access Controls
Dangling Pointer
5. To segregate for the purposes of labeling
Emergency Procedures
Compartmentalize
Full Test (Full Interruption)
Total Risk
6. Requirement of access to data for a clearly defined purpose
Orange Book B2 Classification
Hash Function
Need-To-Know
Voice Over IP (VOIP)
7. Converts source code to an executable
Patent
Compiler
Disaster Recovery Plan
Disaster Recovery Tape
8. An encryption method that has a key as long as the message
Running Key
Backup
Mobile Recovery
Disaster Recovery Tape
9. A signal suggesting a system has been or is being attacked.
Incident Response
Identification
Structured Walkthrough
Alert/Alarm
10. Regular operations are stopped and where processing is moved to the alternate site.
Spiral
Proxies
DR Or BC Coordinator
Full-Interruption test
11. Key
Race Condition
Hijacking
Cryptovariable
Trapdoors (Backdoors) (Maintenance Hooks)
12. A type of multitasking that allows for more even distribution of computing time among competing request
Threats
Discretionary Access Control (DAC)
Education
Preemptive
13. A secure connection to another network.
Orange Book C Classification
Incident
False Attack Stimulus
Gateway
14. Lower frequency noise
Administrative Laws
Checklist Test
Durability
Radio Frequency Interference (RFI)
15. Intellectual property protection for an invention
Patent
Detective
Tar Pits
Botnet
16. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
TEMPEST
Recovery
Initialization Vector
War Dialing
17. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Spam
Machine Language (Machine Code)
Operational Impact Analysis
Access Control Lists
18. Memory - RAM
Investigation
Compiler
Service Bureau
Primary Storage
19. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Technical Access Controls
ITSEC
Administrative
Emergency Procedures
20. Subject based description of a system or a collection of resources
False (False Positive)
Capability Tables
Storage Area Network (SAN)
Recovery
21. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Bit
Record Level Deletion
Firewall
Orange Book C2 Classification
22. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Privacy Laws
Risk Assessment
File Server
Infrastructure
23. Line by line translation from a high level language to machine code
War Dialing
Containment
Steganography
Interpreter
24. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
Detective
Qualitative
Information Technology Security Evaluation Criteria - ITSEC
SQL Injection
25. A set of laws that the organization agrees to be bound by
On-Site
Administrative Law
Pointer
Record Level Deletion
26. To execute more than one instruction at an instant in time
Adware
Multi-Processing
Maximum Tolerable Downtime (MTD)
Due Care
27. Is secondhand and usually not admissible in court
Supervisor Mode (monitor - system - privileged)
Critical Records
Pervasive Computing and Mobile Computing Devices
Hearsay Evidence
28. A test conducted on one or more components of a plan under actual operating conditions.
Operational Test
Firewall
Twisted Pair
Reference Monitor
29. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Public Key Infrastructure (PKI)
Secondary Storage
Civil Or Code Law
Cookie
30. Maximum tolerance for loss of certain business function - basis of strategy
Desk Check Test
Sniffing
Business Records
Recovery Time Objectives
31. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Bollard
Legacy Data
Data Integrity
Layering
32. A database that contains the name - type - range of values - source and authorization for access for each data element
Degauss
Data Dictionary
Simulation Test
Electronic Vaulting
33. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Masked/Interruptible
Cipher Text
Legacy Data
Enticement
34. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Recovery Time Objectives
Recovery Period
Dictionary Attack
Entrapment
35. Code breaking - practice of defeating the protective properties of cryptography.
Running Key
Cryptanalysis
Business Impact Analysis
Common Law
36. A layer 3 device that used to connect two or more network segments and regulate traffic.
Routers
Masquerading
Sampling
Inrush Current
37. Unsolicited advertising software
Adware
Call Tree
Shift Cipher (Caesar)
Redundant Array Of Independent Drives (RAID)
38. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Off-Site Storage
Site Policy Awareness
Call Tree
Blackout
39. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Relocation
Machine Language (Machine Code)
Discretionary Access Control (DAC)
Trade Secret
40. Sudden rise in voltage in the power supply.
Key Escrow
Directive
Cross Training
Surge
41. Location where coordination and execution of BCP or DRP is directed
Patent
Data Backups
Access Control Lists
Emergency Operations Center (EOC)
42. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Control Type
Residual Data
TNI (Red Book)
Exposure
43. A race condition where the security changes during the object's access
User
Time Of Check/Time Of Use
Incident Response
False Attack Stimulus
44. Natural occurrence in circuits that are in close proximity
Interference (Noise)
Microwave
False Attack Stimulus
Authentic
45. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Information Technology Security Evaluation Criteria - ITSEC
Phishing
Simulation Test
IP Address Spoofing
46. Code making
Cryptography
Hearsay
Security Clearance
Brouter
47. Evidence must be: admissible - authentic - complete - accurate - and convincing
Confidence Value
Transients
5 Rules Of Evidence
Workaround Procedures
48. A distributed system's transaction control that requires updates to complete or rollback
2-Phase Commit
Reference Monitor
Chain of Custody
Shadowing (file shadowing)
49. An unintended communication path
Covert Channel
Buffer Overflow
Damage Assessment
Proxies
50. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Processes are Isolated By
Cryptography
Information Technology Security Evaluation Criteria - ITSEC
Business Impact Analysis