SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Written core statements that rarely change
Legacy Data
Policy
Permutation /Transposition
Phishing
2. Asymmetric encryption of a hash of message
Digital Signature
Territoriality
Kernel
Resumption
3. Short period of low voltage.
Sag/Dip
Reference Monitor
Control Category
Monitor
4. Policy or stated actions
Due Care
True Attack Stimulus
Twisted Pair
Shielding
5. Pertaining to law - accepted by a court
Examples of technical security components
Admissible
Deletion
Risk Mitigation
6. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Workaround Procedures
Sniffing
True Attack Stimulus
Orange Book C2 Classification
7. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
File Sharing
Business Continuity Program
Forward Recovery
Business Continuity Steering Committee
8. Information about data or records
Mantrap (Double Door System)
Surge
Metadata
Permutation /Transposition
9. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Coaxial Cable
Critical Functions
Directive
Business Continuity Program
10. A back up type - where the organization has excess capacity in another location.
Blackout
Firmware
Distributed Processing
Keystroke Logging
11. Forging of an IP address.
IP Address Spoofing
Replication
Identification
Pervasive Computing and Mobile Computing Devices
12. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Job Rotation
Keystroke Logging
Cryptovariable
BCP Testing Drills and Exercises
13. A technology that reduces the size of a file.
Revocation
Compression
Multiplexers
Multilevel Security System
14. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
File Server
Top Secret
Ring Protection
Modems
15. Amount of time for restoring a business process or function to normal operations without major loss
Procedure
Blind Testing
Deadlock
Maximum Tolerable Downtime (MTD)
16. Business and technical process of applying security software updates in a regulated periodic way
Patch Management
Fault
Burn
Technical Access Controls
17. A covert storage channel on the file attribute
Source Routing Exploitation
Alternate Data Streams (File System Forks)
Time Of Check/Time Of Use
Operational Exercise
18. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
ITSEC
File Sharing
Security Kernel
Database Shadowing
19. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Threat Agent
Critical Infrastructure
Threads
Cross-Site Scripting
20. Impossibility of denying authenticity and identity
Multi-Tasking
Non-Repudiation
Separation Of Duties
Authorization
21. Moving letters around
Dictionary Attack
Integrated Test
Private Branch Exchange (PBX)
Permutation /Transposition
22. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Capability Tables
Coaxial Cable
Copyright
Method
23. Alerts personnel to the presence of a fire
Initialization Vector
Due Diligence
Honeypot
Fire Detection
24. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Parallel Test
Voice Over IP (VOIP)
Checklist Test (desk check)
Class
25. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Revocation
Polyalphabetic
Multi-Processing
Fiber Optics
26. Real-time data backup ( Data Mirroring)
Domain
Legacy Data
Database Shadowing
Sag/Dip
27. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Mission-Critical Application
File Shadowing
Remanence
Business Interruption
28. Guidelines within an organization that control the rules and configurations of an IDS
Site Policy
SQL Injection
Fraggle
Key Management
29. Try a list of words in passwords or encryption keys
Dictionary Attack
Smurf
Birthday Attack
Threads
30. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
War Dialing
Cross Certification
Damage Assessment
Liability
31. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Recovery Time Objectives
Active Data
Business Unit Recovery
Data Leakage
32. State of computer - to be running a process
Technical Access Controls
Operating
Inference
Identification
33. Vehicle or tool that exploits a weakness
Standard
Information Risk Management (IRM)
Exposure
Threats
34. A secure connection to another network.
Copyright
CPU Cache
Gateway
Checklist Test (desk check)
35. Responsibility of a user for the actions taken by their account which requires unique identification
Accountability
Desk Check Test
Surge
Supervisor Mode (monitor - system - privileged)
36. The technical and risk assesment of a system within the context of the operating environment
Certification
Orange Book B2 Classification
Plain Text
Risk Assessment
37. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Key Escrow
Memory Management
Quantitative
Walk Though
38. Process whereby data is removed from active files and other data storage structures
Deletion
Data Dictionary
Classification
TNI (Red Book)
39. A collection of data or information that has a name
Convincing
File
Quantitative
Labeling
40. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Bumping
Integrated Test
Business Impact Analysis
Test Plan
41. Mathematical function that determines the cryptographic operations
Change Control
Data Hiding
Territoriality
Algorithm
42. To create a copy of data as a precaution against the loss or damage of the original data.
Simulation
Privacy Laws
Backup
Remote Access Trojan
43. More than one process in the middle of executing at a time
Network Attached Storage (NAS)
Durability
Multi-Tasking
Recovery
44. Unauthorized wireless network access device.
System Life Cycle
Fire Classes
Least Privilege
Rogue Access Points
45. Requirement to take time off
Containment
Binary
Disaster
Mandatory Vacations
46. People protect their domain
Entrapment
Territoriality
Brownout
Accurate
47. A condition in which neither party is willing to stop their activity for the other to complete
Authentication
Birthday Attack
Deadlock
Risk Assessment
48. A layer 3 device that used to connect two or more network segments and regulate traffic.
Business Records
Security Domain
Routers
Information Flow Model
49. Pertaining to law - no omissions
Complete
Smurf
Running Key
Adware
50. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Access Control Matrix
Threats
Safeguard
Disaster Recovery Plan