SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A mathematical tool for verifying no unintentional changes have been made
Simulation
Checksum
False (False Positive)
Record Level Deletion
2. The collection and summation of risk data relating to a particular asset and controls for that asset
Shift Cipher (Caesar)
Storage Area Network (SAN)
User Mode (problem or program state)
Risk Assessment
3. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Reciprocal Agreement
Failure Modes and Effect Analysis (FEMA)
TCSEC (Orange Book)
Accountability
4. Asymmetric encryption of a hash of message
Access Control
File
Custodian
Digital Signature
5. The core of a computer that calculates
Central Processing Unit (CPU)
Brouter
Containment
Bumping
6. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Polymorphism
Fragmented Data
Residual Risk
Journaling
7. The hard drive
Hash Function
Noise
Secondary Storage
Fraggle
8. Control type- that is communication based - typically written or oral
Dangling Pointer
Administrative
Patent
IP Address Spoofing
9. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Integrated Test
Investigation
Satellite
Compartmentalize
10. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Incident
Generator
Gateway
Memory Management
11. Small data files written to a user's hard drive by a web server.
Steganography
Cookie
ff Site
Archival Data
12. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Business Impact Assessment (BIA)
Encipher
Masked/Interruptible
Privacy Laws
13. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Elements of Negligence
Cross-Site Scripting
Collisions
HTTP Response Splitting
14. Provides a physical cross connect point for devices.
Non-Repudiation
Ring Protection
Failure Modes and Effect Analysis (FEMA)
Patch Panels
15. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Mandatory Access Control (MAC)
Mantrap (Double Door System)
Desk Check Test
Business Continuity Steering Committee
16. Lower frequency noise
Access Control Lists
Multilevel Security System
Multi-Processor
Radio Frequency Interference (RFI)
17. A collection of information designed to reduce duplication and increase integrity
Plan Maintenance Procedures
Business Unit Recovery
Simulation
Databases
18. Effort/time needed to overcome a protective measure
Bollard
Firewalls
Work Factor
Detection
19. A process state - to be executing a process on the CPU
Running
Emergency Procedures
Containment
Identification
20. Eavesdropping on network communications by a third party.
Recovery Time Objectives
Tapping
Burn
Computer System Evidence
21. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Recovery Strategy
Process Isolation
File Shadowing
Distributed Processing
22. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Access Control Attacks
Inrush Current
Salami
Injection
23. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Sequence Attacks
Architecture
Mirroring
Life Cycle of Evidence
24. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Warm Site
Corrective
Restoration
BCP Testing Drills and Exercises
25. Intellectual property protection for the expression of an idea
Debriefing/Feedback
Disk Mirroring
Copyright
Admissible
26. An attack involving the hijacking of a TCP session by predicting a sequence number.
Sequence Attacks
Restoration
Contingency Plan
Need-To-Know
27. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
War Driving
Simulation Test
Deletion
Emergency Procedures
28. Momentary loss of power
Education
Residual Data
Fault
Risk Assessment
29. A test conducted on one or more components of a plan under actual operating conditions.
Operational Test
Interception
Threats
Hot Spares
30. Can be statistical (monitor behavior) or signature based (watch for known attacks)
Full Test (Full Interruption)
IDS Intrusion Detection System
Containment
Residual Risk
31. A state where two subjects can access the same object without proper mediation
Critical Records
Race Condition
Administrative Laws
Archival Data
32. What is will remain - persistence
Durability
Overlapping Fragment Attack
Separation Of Duties
Time Of Check/Time Of Use
33. Recovery alternative which outsources a business function at a cost
Parallel Test
TEMPEST
Cryptography
Service Bureau
34. An asymmetric cryptography mechanism that provides authentication.
Domain
Standard
Digital Signature
Access Point
35. A type of multitasking that allows for more even distribution of computing time among competing request
Record Level Deletion
Symmetric
Preemptive
Birthday Attack
36. A device that sequentially switches multiple analog inputs to the output.
Business Unit Recovery
Twisted Pair
Data Leakage
Multiplexers
37. Two different keys decrypt the same cipher text
Key Clustering
Orange Book B1 Classification
Residual Risk
Alarm Filtering
38. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Control
Process Isolation
Failure Modes and Effect Analysis (FEMA)
Log
39. To segregate for the purposes of labeling
Change Control
Security Kernel
Data Custodian
Compartmentalize
40. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Analysis
Security Domain
Remanence
Digital Signature
41. RADIUS - TACACS+ - Diameter
Residual Risk
Content Dependent Access Control
Contact List
Centralized Access Control Technologies
42. Malware that makes small random changes to many data points
UPS
Tort
Data Diddler
Watermarking
43. Memory - RAM
Classification
Primary Storage
Business Recovery Team
Cryptography
44. Descrambling the encrypted message with the corresponding key
Sag/Dip
Activation
Decipher
Key Management
45. Communication of a security incident to stakeholders and data owners.
Redundant Servers
Logic Bomb
Life Cycle of Evidence
Notification
46. Abstract and mathematical in nature - defining all possible states - transitions and operations
Injection
State Machine Model
Prevention
Ethics
47. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
File Server
Risk Assessment
Recovery Point Objective (RPO)
Concatenation
48. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Hub
Tracking
Data Dictionary
Computer System Evidence
49. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
EMI
Business Interruption
Fire Classes
Eavesdropping
50. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Radio Frequency Interference (RFI)
Botnet
Archival Data
Declaration