SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Final purpose or result
Payload
Race Condition
Quantitative Risk Analysis
Fragmented Data
2. Joining two pieces of text
Copyright
Concatenation
Electrostatic Discharge
File Sharing
3. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Business Continuity Program
Recovery Strategy
True Attack Stimulus
Risk Assessment / Analysis
4. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Electronic Vaulting
Declaration
Compression
Spiral
5. Unused storage capacity
Fault Tolerance
Slack Space
Tar Pits
Fire Prevention
6. Hiding the fact that communication has occurred
Steganography
Security Blueprint
Security Kernel
Mandatory Access Control (MAC)
7. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Slack Space
Critical Functions
Legacy Data
Fraggle
8. Control category - more than one control on a single asset
Compensating
Open Mail Relay Servers
Data Hiding
On-Site
9. Communication of a security incident to stakeholders and data owners.
Notification
Codec
Business Continuity Steering Committee
Waterfall
10. Pertaining to law - high degree of veracity
Business Recovery Team
Supervisor Mode (monitor - system - privileged)
Accurate
Mirrored Site
11. A software design technique for abstraction of a process
Rogue Access Points
Walk Though
Data Hiding
Database Shadowing
12. Fault tolerance for power
Generator
Quantitative Risk Analysis
False (False Positive)
Fire Detection
13. Alerts personnel to the presence of a fire
Active Data
Preemptive
Residual Risk
Fire Detection
14. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Orange Book A Classification
Denial Of Service
Keyed-Hashing For Message Authentication
Emergency
15. To evaluate the current situation and make basic decisions as to what to do
Recovery
Database Replication
Multiplexers
Triage
16. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Denial Of Service
Capability Tables
Application Programming Interface
Access Control Lists
17. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Hijacking
Disaster Recovery Tape
Confidence Value
False (False Positive)
18. Policy or stated actions
Due Care
Hot Spares
Parallel Test
Recovery
19. Momentary loss of power
Cross Certification
Database Replication
Fault
High-Risk Areas
20. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Legacy Data
Byte Level Deletion
Buffer Overflow
Contact List
21. A test conducted on one or more components of a plan under actual operating conditions.
Operational Test
Codec
Operational Impact Analysis
Burn
22. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Business Continuity Planning (BCP)
Convincing
Accurate
War Dialing
23. OOP concept of a taking attributes from the original or parent
Relocation
Accountability
Recovery Period
Inheritance
24. To stop damage from spreading
Dangling Pointer
Business Impact Analysis
Containment
Multi-Core
25. Unchecked data which spills into another location in memory
Internal Use Only
Buffer Overflow
Mitigate
Operating
26. Review of data
Binary
Incident Handling
Analysis
Site Policy
27. Renders the record inaccessible to the database management system
Record Level Deletion
Routers
BCP Testing Drills and Exercises
Access Control Lists
28. A control before attack
Safeguard
Algorithm
Chain Of Custody
Adware
29. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Discretionary Access Control (DAC)
Data Owner
Encapsulation
Slack Space
30. A passive network attack involving monitoring of traffic.
Eavesdropping
Log
Recovery Point Objective (RPO)
Territoriality
31. Periodic - automatic and transparent backup of data in bulk.
User Mode (problem or program state)
State Machine Model
Electronic Vaulting
Decipher
32. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Cold Site
Fraggle
Isolation
Key Clustering
33. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Discretionary Access Control (DAC)
Residual Risk
MOM
Proxies
34. A signal suggesting a system has been or is being attacked.
Incident Response
Alert/Alarm
File Level Deletion
Off-Site Storage
35. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What is will remain - persistence
2-Phase Commit
Code
Durability
Elements of Negligence
37. A technology that reduces the size of a file.
Mock Disaster
Polymorphism
Compression
Disaster Recovery Teams (Business Recovery Teams)
38. Memory management technique which allows data to be moved from one memory address to another
Relocation
Digital Signature
Test Plan
Non-Discretionary Access Control
39. Recognition of an individual's assertion of identity.
Fragmented Data
Site Policy Awareness
Identification
Brute Force
40. Methodical research of an incident with the purpose of finding the root cause
Investigation
Remote Journaling
Domain
Public Key Infrastructure (PKI)
41. An attack involving the hijacking of a TCP session by predicting a sequence number.
Confidence Value
Sequence Attacks
Method
Journaling
42. Key
Inheritance
Salami
File Sharing
Cryptovariable
43. A documented battle plan for coordinating response to incidents.
Multi-Party Control
Electrostatic Discharge
Incident Handling
Procedure
44. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Test Plan
Certification Authority
Multi-Processing
Residual Risk
45. Actions measured against either a policy or what a reasonable person would do
Due Diligence
Checklist Test
Mandatory Access Control (MAC)
Network Attached Storage (NAS)
46. OOP concept of a distinct copy of the class
Framework
Object
Simulation Test
User
47. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Embedded
Mock Disaster
Compiler
Rollback
48. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Investigation
Sampling
Prevention
ISO/IEC 27002
49. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Smurf
Hearsay Evidence
Data Marts
Information Risk Management (IRM)
50. Location where coordination and execution of BCP or DRP is directed
Risk
Incident
Emergency Operations Center (EOC)
Contingency Plan