SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. High degree of visual control
Overlapping Fragment Attack
Surveillance
Tracking
Distributed Processing
2. A mobilized resource purchased or contracted for the purpose of business recovery.
Digital Signature
Inference
Moore's Law
Mobile Recovery
3. Business and technical process of applying security software updates in a regulated periodic way
Satellite
Layering
Patch Management
Recovery
4. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Classification Scheme
Standalone Test
Journaling
Phishing
5. Dedicated fast memory located on the same board as the CPU
CPU Cache
SQL Injection
Multi-Tasking
Kerberos
6. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Multi-Processing
Binary
IP Fragmentation
Satellite
7. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Checksum
Tactical
Hot Spares
Convincing
8. All of the protection mechanism in a computer system
Initialization Vector
War Dialing
Business Impact Assessment (BIA)
Trusted Computing Base
9. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Encipher
Workaround Procedures
Message Digest
Internal Use Only
10. What is will remain - persistence
Buffer Overflow
Durability
Data Leakage
Key Management
11. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Multi-Party Control
Quantitative
Privacy Laws
Plain Text
12. Inappropriate data
Business Continuity Planning (BCP)
Recovery Time Objectives
Copyright
Malformed Input
13. A failure of an IDS to detect an actual attack
Revocation
Remote Journaling
Forensic Copy
False Negative
14. Disruption of operation of an electronic device due to a competing electromagnetic field.
Certification
EMI
Asymmetric
Payload
15. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Recovery Period
Administrative Law
Trusted Computing Base
Cache
16. Another subject cannot see an ongoing or pending update until it is complete
ITSEC
Isolation
Fire Detection
Sampling
17. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Emergency Procedures
Emergency Operations Center (EOC)
Quantitative
Inference
18. An asymmetric cryptography mechanism that provides authentication.
Reciprocal Agreement
Digital Signature
Access Control
Process Isolation
19. Can be statistical (monitor behavior) or signature based (watch for known attacks)
IDS Intrusion Detection System
File Extension
Time Of Check/Time Of Use
Emergency Operations Center (EOC)
20. More than one process in the middle of executing at a time
User Mode (problem or program state)
Confidence Value
Multi-Tasking
Labeling
21. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Archival Data
Simulation Test
Notification
Security Kernel
22. The first rating that requires security labels
Orange Book B1 Classification
Databases
Cryptology
Change Control
23. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
ISO/IEC 27002
Log
Domain
Patent
24. Property that data is represented in the same manner at all times
Analysis
Certification Authority
Consistency
Buffer Overflow
25. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Inheritance
Hard Disk
Work Factor
IDS Intrusion Detection System
26. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Routers
5 Rules Of Evidence
Disaster Recovery Tape
Control Category
27. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Due Diligence
Byte Level Deletion
Emergency
Wait
28. Employment education done once per position or at significant change of function
IDS Intrusion Detection System
Business Impact Analysis
Risk Mitigation
Job Training
29. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Mock Disaster
Pointer
Gateway
Guidelines
30. Recovery alternative - complete duplication of services including personnel
Mirrored Site
Tapping
Hijacking
Data Leakage
31. A test conducted on one or more components of a plan under actual operating conditions.
Convincing
Multilevel Security System
Investigation
Operational Test
32. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Identification
Fire Classes
Object Oriented Programming (OOP)
Byte
33. A subnetwork with storage devices servicing all servers on the attached network.
Storage Area Network (SAN)
Common Criteria
Containment
War Dialing
34. The one person responsible for data - its classification and control setting
Information Owner
Deletion
Smurf
Public Key Infrastructure (PKI)
35. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Data Integrity
Access Control Attacks
Recovery Strategy
Trade Secret
36. Measures followed to restore critical functions following a security incident.
Hub
Virus
Recovery
Site Policy
37. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
JPEG (Joint Photographic Experts Group)
Cross-Site Scripting
Trapdoors (Backdoors) (Maintenance Hooks)
Business Interruption Insurance
38. Two certificate authorities that trust each other
Cross Certification
Surveillance
Declaration
Alarm Filtering
39. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
File Shadowing
Disaster Recovery Teams (Business Recovery Teams)
Burn
Resumption
40. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Open Mail Relay Servers
Trusted Computing Base
Simulation Test
Generator
41. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Cryptanalysis
Redundant Servers
Non-Repudiation
Virtual Memory
42. A signal suggesting a system has been or is being attacked.
Alert/Alarm
Residual Risk
Total Risk
Information Risk Management (IRM)
43. A process state - to be either be unable to run waiting for an external event or terminated
Coaxial Cable
Evidence
Access Control Attacks
Stopped
44. To reduce fire
Key Clustering
Code
Fire Suppression
Analysis
45. Unauthorized access of network devices.
Civil Law
Collisions
Satellite
Physical Tampering
46. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
5 Rules Of Evidence
Proxies
Call Tree
Service Bureau
47. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Reference Monitor
Adware
Chain Of Custody
Encapsulation
48. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Data Leakage
Uninterruptible Power Supply (UPS)
Code
False (False Positive)
49. Mathematical function that determines the cryptographic operations
Electromagnetic Interference (EMI)
Operating
Territoriality
Algorithm
50. To know more than one job
Off-Site Storage
Risk
Cross Training
Remote Access Trojan