SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Object based description of a system or a collection of resources
Deleted File
Access Control Matrix
Alarm Filtering
Criminal Law
2. People who interact with assets
Active Data
Atomicity
SQL Injection
User
3. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Data Recovery
Private Branch Exchange (PBX)
Multi-Processor
ISO/IEC 27002
4. Prolonged loss of commercial power
Highly Confidential
Blackout
Phishing
Vital Record
5. Code making
Cryptography
Labeling
Substitution
Digital Certificate
6. A backup type which creates a complete copy
Replication
Simulation Test
Shadowing (file shadowing)
Sequence Attacks
7. Independent malware that requires user interaction to execute
Data Dictionary
Bollard
Virus
Data Hiding
8. False memory reference
Information Flow Model
Record Level Deletion
Modification
Dangling Pointer
9. A electronic attestation of identity by a certificate authority
Emergency Operations Center (EOC)
Digital Certificate
Trojan Horse
Denial Of Service
10. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. An asymmetric cryptography mechanism that provides authentication.
Digital Signature
Copyright
Risk Mitigation
Surge Suppressor
12. Threats x Vulnerability x Asset Value = Total Risk
Threat Agent
Total Risk
Multiplexers
Fragmented Data
13. A choice in risk management - to implement a control that limits or lessens negative effects
Guidelines
Adware
Mitigate
Operational Impact Analysis
14. Line noise that is superimposed on the supply circuit.
Database Replication
Transients
Revocation
Contact List
15. Individuals and departments responsible for the storage and safeguarding of computerized data.
3 Types of harm Addressed in computer crime laws
Data Custodian
TNI (Red Book)
Instance
16. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Data Owner
File Shadowing
Disaster Recovery Plan
Threats
17. Used to code/decode a digital data stream.
Replication
Codec
Electronic Vaulting
Framework
18. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Data Integrity
E-Mail Spoofing
Administrative
Due Diligence
19. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Parallel Test
Simulation Test
Multi-Processing
Monitor
20. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Confidence Value
JPEG (Joint Photographic Experts Group)
Operating
Mandatory Access Control (MAC)
21. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
IP Address Spoofing
Byte Level Deletion
Administrative
Administrative Law
22. With enough computing power trying all possible combinations
Risk Assessment
Message Digest
Brute Force
Hacker
23. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Walk Though
Inference
CPU Cache
Critical Infrastructure
24. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Algorithm
Fraggle
Procedure
CobiT
25. The event signaling an IDS to produce an alarm when no attack has taken place
Education
False Attack Stimulus
Workaround Procedures
Key Management
26. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
ISO/IEC 27001
Fragmented Data
Databases
Confidence Value
27. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Blind Testing
Mobile Site
Access Control Lists
Cross-Site Scripting
28. Hardware or software that is part of a larger system
Ring Protection
Embedded
Shadowing (file shadowing)
Double Blind Testing
29. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Cryptology
Exercise
File Level Deletion
Waterfall
30. DoS - Spoofing - dictionary - brute force - wardialing
DR Or BC Coordinator
Access Control Attacks
Recovery
Entrapment
31. Vehicle stopping object
Bollard
Event
Process Isolation
Trapdoors (Backdoors) (Maintenance Hooks)
32. Weak evidence
Hearsay
Sag/Dip
Education
False Negative
33. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Emergency
Walk Though
Forensic Copy
Dangling Pointer
34. An encryption method that has a key as long as the message
Running Key
Business Continuity Program
Modems
Classification Scheme
35. Try a list of words in passwords or encryption keys
Dictionary Attack
Checkpoint
Directive
Race Condition
36. Control category- to discourage an adversary from attempting to access
Deterrent
Stopped
Race Condition
Birthday Attack
37. Potentially compromising leakage of electrical or acoustical signals.
Routers
Cryptology
Emanations
Preemptive
38. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Internal Use Only
Threats
Qualitative
Birthday Attack
39. Forgery of the sender's email address in an email header.
Rogue Access Points
Deleted File
Surveillance
E-Mail Spoofing
40. Amount of time for restoring a business process or function to normal operations without major loss
Maximum Tolerable Downtime (MTD)
Isolation
Assembler
Exercise
41. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Record Level Deletion
Man-In-The-Middle Attack
Examples of non-technical security components
Business Interruption
42. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Kerckhoff's Principle
Data Backup Strategies
Mission-Critical Application
Bumping
43. The core logic engine of an operating system which almost never changes
Near Site
Honeynet
CobiT
Kernel
44. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Sampling
Brownout
Off-Site Storage
File Extension
45. May be responsible for overall recovery of an organization or unit(s).
DR Or BC Coordinator
Voice Over IP (VOIP)
Multi-Programming
HTTP Response Splitting
46. Intellectual property protection for an confidential and critical process
Fault Tolerance
Time Of Check/Time Of Use
Trade Secret
Mock Disaster
47. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Open Mail Relay Servers
True Attack Stimulus
Honeynet
Central Processing Unit (CPU)
48. Less granular organization of controls -
Metadata
Control Type
Virtual Memory
Crisis
49. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
MOM
Data Backups
Civil Law
Fragmented Data
50. The level and label given to an individual for the purpose of compartmentalization
Security Clearance
Certification Authority
Business Continuity Planning (BCP)
Collisions