SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One way encryption
Emergency Operations Center (EOC)
Hash Function
Substitution
Permutation /Transposition
2. Amount of time for restoring a business process or function to normal operations without major loss
Cold Site
Maximum Tolerable Downtime (MTD)
Basics Of Secure Design
Rogue Access Points
3. A device that provides the functions of both a bridge and a router.
Brouter
Call Tree
Electronic Vaulting
Multi-Core
4. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Symmetric
Journaling
Tar Pits
Multi-Core
5. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Byte
Journaling
Cryptography
Hearsay Evidence
6. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
Mock Disaster
Salami
Forward Recovery
Damage Assessment
7. To reduce fire
Blind Testing
Fire Suppression
Mobile Site
Event
8. Review of data
Alternate Data Streams (File System Forks)
False (False Positive)
Adware
Analysis
9. Potentially compromising leakage of electrical or acoustical signals.
Protection
Emanations
Cryptology
Civil Law
10. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Certification Authority
Mirroring
Checkpoint
Virtual Memory
11. A design methodology which addresses risk early and often
Blackout
Metadata
Spiral
Full-Interruption test
12. A device that sequentially switches multiple analog inputs to the output.
Protection
Symmetric
Multiplexers
Cryptanalysis
13. Used to code/decode a digital data stream.
2-Phase Commit
Codec
Domain
Salami
14. A risk assessment method - intrinsic value
Authentic
Qualitative
Rollback
Certification Authority
15. One of the key benefits of a network is the ability to share files stored on the server among several users.
File Sharing
Kerckhoff's Principle
Administrative Laws
Source Routing Exploitation
16. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Instance
Record Level Deletion
Eavesdropping
Initialization Vector
17. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Digital Signature
Voice Over IP (VOIP)
Data Owner
Critical Records
18. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Masked/Interruptible
UPS
File Sharing
Side Channel Attack
19. Evidence must be: admissible - authentic - complete - accurate - and convincing
Database Replication
5 Rules Of Evidence
Access Point
Running Key
20. Methodical research of an incident with the purpose of finding the root cause
Overlapping Fragment Attack
Investigation
Activation
Residual Data
21. A collection of information designed to reduce duplication and increase integrity
Mobile Site
Databases
Botnet
Plaintext
22. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Civil Law
Authentication
Disaster Recovery Plan
Control
23. Using many alphabets
Polyalphabetic
Change Control
Masked/Interruptible
Distributed Processing
24. Impossibility of denying authenticity and identity
Territoriality
Non-Repudiation
Change Control
Data Custodian
25. A documented battle plan for coordinating response to incidents.
ff Site
Emergency Procedures
Incident Handling
File Server
26. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Disaster Recovery Tape
Dangling Pointer
Emergency
Cookie
27. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
Open Mail Relay Servers
Custodian
Top Secret
28. Lower frequency noise
Radio Frequency Interference (RFI)
On-Site
Worldwide Interoperability for Microwave Access (WI-MAX )
Recovery Point Objective (RPO)
29. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Checksum
Discretionary Access Control (DAC)
Injection
Job Training
30. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Authentication
Stopped
Object Oriented Programming (OOP)
Copyright
31. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Asymmetric
BCP Testing Drills and Exercises
Operational Exercise
Basics Of Secure Design
32. A set of laws that the organization agrees to be bound by
Double Blind Testing
Separation Of Duties
Administrative Law
Disaster Recovery Tape
33. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Classification Scheme
Message Digest
Common Criteria
Checkpoint
34. Converts source code to an executable
Compiler
Routers
Detective
Transients
35. Written core statements that rarely change
Security Domain
Dangling Pointer
Policy
E-Mail Spoofing
36. Vehicle stopping object
Object Oriented Programming (OOP)
Structured Walkthrough
Bollard
Control Type
37. Third party processes used to organize the implementation of an architecture
Simulation Test
Pervasive Computing and Mobile Computing Devices
Framework
Interpreter
38. Intellectual property protection for an invention
Patent
Declaration
Business Recovery Timeline
Wireless Fidelity (Wi-Fi )
39. Return to a normal state
Control Category
Key Clustering
Recovery
Time Of Check/Time Of Use
40. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Accreditation
Due Diligence
Microwave
Business Recovery Timeline
41. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Business Impact Assessment (BIA)
Permutation /Transposition
Network Attached Storage (NAS)
Data Dictionary
42. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Business Continuity Planning (BCP)
Transfer
Tort
Patch Panels
43. DoS - Spoofing - dictionary - brute force - wardialing
Compression
Privacy Laws
Access Control Attacks
Digital Signature
44. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. A process state - to be either be unable to run waiting for an external event or terminated
File Shadowing
Worm
Remote Journaling
Stopped
46. Record history of incident
Tracking
Copyright
Multi-Core
Object
47. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Boot (V.)
Recovery Period
Decipher
Event
48. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Chain of Custody
Critical Records
Threats
Forensic Copy
49. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Remanence
File Extension
Denial Of Service
Business Impact Analysis
50. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Overlapping Fragment Attack
Simulation Test
True Attack Stimulus
Elements of Negligence