SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. High frequency noise
Adware
Electromagnetic Interference (EMI)
Shift Cipher (Caesar)
Monitor
2. Impossibility of denying authenticity and identity
Copyright
Non-Repudiation
Mitigate
TCSEC (Orange Book)
3. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Interference (Noise)
Business Impact Assessment (BIA)
Private Branch Exchange (PBX)
Network Attached Storage (NAS)
4. Renders the file inaccessible to the operating system - available to reuse for data storage.
Method
Confidence Value
Instance
File Level Deletion
5. Short period of low voltage.
Trapdoors (Backdoors) (Maintenance Hooks)
Radio Frequency Interference (RFI)
One Time Pad
Sag/Dip
6. Inappropriate data
Content Dependent Access Control
Malformed Input
Administrative Laws
Fault
7. Two certificate authorities that trust each other
Message Digest
Cross Certification
Certification Authority
Exposure
8. Intellectual property protection for the expression of an idea
Copyright
Memory Management
Data Backups
Certification Authority
9. RADIUS - TACACS+ - Diameter
Access Point
Centralized Access Control Technologies
Rogue Access Points
Transients
10. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Strategic
True Attack Stimulus
Multi-Processor
Radio Frequency Interference (RFI)
11. Mitigation of system or component loss or interruption through use of backup capability.
Distributed Processing
Containment
Fault Tolerance
Remote Journaling
12. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Crisis
Analysis
Binary
Byte
13. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Corrective
High-Risk Areas
Exercise
Mirrored Site
14. Firewalls - encryption - and access control lists
Injection
Plaintext
Examples of technical security components
Recovery Strategy
15. The managerial approval to operate a system based upon knowledge of risk to operate
Disk Mirroring
Accreditation
Recovery Period
Full-Interruption test
16. A system that enforces an access control policy between two networks.
Site Policy Awareness
Patent
Firewalls
Blind Testing
17. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Emergency Procedures
Checkpoint
Machine Language (Machine Code)
Restoration
18. A failure of an IDS to detect an actual attack
Near Site
False Negative
Object
Method
19. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Proxies
Injection
Cold Site
Authentication
20. A collection of information designed to reduce duplication and increase integrity
Recovery Time Objectives
Databases
Multi-Programming
State Machine Model
21. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.
Risk Mitigation
Revocation
Ring Protection
Territoriality
22. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Custodian
Redundant Array Of Independent Drives (RAID)
Accreditation
Business Recovery Team
23. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Residual Data
Threats
Forensic Copy
Denial Of Service
24. Real-time data backup ( Data Mirroring)
Database Shadowing
Ethics
Security Kernel
Recovery
25. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Uninterruptible Power Supply (UPS)
Instance
Generator
Authorization
26. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Keyed-Hashing For Message Authentication
Failure Modes and Effect Analysis (FEMA)
Simulation Test
Threats
27. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
3 Types of harm Addressed in computer crime laws
Parallel Test
Criminal Law
Need-To-Know
28. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
2-Phase Commit
Convincing
Conflict Of Interest
Critical Records
29. Evaluation of a system without prior knowledge by the tester
Worm
Blind Testing
File Level Deletion
Fire Detection
30. Highest level of authority at EOC with knowledge of the business process and the resources available
Cryptovariable
Incident Manager
Embedded
Technical Access Controls
31. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Switches
Masked/Interruptible
Convincing
Plaintext
32. Creation distribution update and deletion
Compensating
Key Management
Cold Site
Compression
33. Maintenance procedures outline the process for the review and update of business continuity plans.
Protection
Plan Maintenance Procedures
Multilevel Security System
Mobile Recovery
34. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Rollback
Symmetric
Desk Check Test
Notification
35. Independent malware that requires user interaction to execute
Eavesdropping
Mixed Law System
Repeaters
Virus
36. All of the protection mechanism in a computer system
Keyed-Hashing For Message Authentication
Structured Walkthrough
Trusted Computing Base
Accurate
37. State of computer - to be running a process
Spyware
Operating
Common Criteria
Capability Tables
38. Line by line translation from a high level language to machine code
Forensic Copy
Interpreter
Trapdoors (Backdoors) (Maintenance Hooks)
Encipher
39. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Risk Assessment
War Driving
Structured Walkthrough
Backup
40. Memory management technique that allows two processes to run concurrently without interaction
Protection
Radio Frequency Interference (RFI)
Overlapping Fragment Attack
Logic Bomb
41. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Operational Impact Analysis
Buffer Overflow
Containment
Disaster Recovery Teams (Business Recovery Teams)
42. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
Smurf
Assembler
Inference
43. Recording activities at the keyboard level
Critical Infrastructure
Layering
Keystroke Logging
Wireless Fidelity (Wi-Fi )
44. Event(s) that cause harm
Vulnerability
Examples of non-technical security components
Incident
Operating
45. Code breaking - practice of defeating the protective properties of cryptography.
Containment
Multilevel Security System
Call Tree
Cryptanalysis
46. Potentially compromising leakage of electrical or acoustical signals.
Accreditation
Emanations
Structured Walk-Through Test
Workaround Procedures
47. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
SQL Injection
Remanence
Codec
TCSEC (Orange Book)
48. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Vulnerability
Reference Monitor
Rootkit
Failure Modes and Effect Analysis (FEMA)
49. A documented battle plan for coordinating response to incidents.
Incident Handling
Monitor
Contact List
Full-Interruption test
50. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Redundant Array Of Independent Drives (RAID)
Legacy Data
Consistency
Simulation Test