SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Final purpose or result
Concatenation
Shadowing (file shadowing)
Payload
Fault Tolerance
2. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Security Domain
ISO/IEC 27002
True Attack Stimulus
Critical Infrastructure
3. Subject based description of a system or a collection of resources
Method
Complete
Capability Tables
Packet Filtering
4. Maintenance procedures outline the process for the review and update of business continuity plans.
Lattice
ITSEC
Plan Maintenance Procedures
Multi-Programming
5. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Critical Functions
Disaster
Salami
Preemptive
6. Encryption system using a pair of mathematically related unequal keys
Asymmetric
Quantitative Risk Analysis
Multi-Processing
Internal Use Only
7. Sudden rise in voltage in the power supply.
Interference (Noise)
Kernel
Surge
Internal Use Only
8. Natural occurrence in circuits that are in close proximity
Interception
Threads
Key Space
Interference (Noise)
9. A mathematical tool for verifying no unintentional changes have been made
Deletion
Checksum
Mobile Recovery
Civil Law
10. To reduce fire
Fire Suppression
Alarm Filtering
Examples of non-technical security components
Plain Text
11. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Identification
Backup
Recovery Strategy
One Time Pad
12. Firewalls - encryption - and access control lists
Alert/Alarm
Residual Data
War Dialing
Examples of technical security components
13. A risk assessment method - intrinsic value
Storage Area Network (SAN)
Change Control
Qualitative
Classification Scheme
14. Planning with a goal of returning to the normal business function
Desk Check Test
Information Owner
Fire Detection
Restoration
15. Renders the record inaccessible to the database management system
Classification Scheme
Adware
Record Level Deletion
CPU Cache
16. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Coaxial Cable
Top Secret
Orange Book D Classification
2-Phase Commit
17. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Compensating
Emergency Procedures
Risk Assessment / Analysis
Digital Signature
18. The hard drive
Compression
Security Blueprint
Secondary Storage
Recovery
19. Binary decision by a system of permitting or denying access to the entire system
Workaround Procedures
Damage Assessment
File Sharing
Authentication
20. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Countermeasure
Alternate Data Streams (File System Forks)
Business Unit Recovery
Multi-Programming
21. Reduction of voltage by the utility company for a prolonged period of time
Encipher
Brownout
Collisions
Kerberos
22. The level and label given to an individual for the purpose of compartmentalization
Security Clearance
Multiplexers
Control Type
Shadowing (file shadowing)
23. A trusted issuer of digital certificates
Certification Authority
Spiral
Internal Use Only
Content Dependent Access Control
24. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Polymorphism
Business Continuity Program
Threat Agent
Risk Mitigation
25. A hash that has been further encrypted with a symmetric algorithm
Mirrored Site
Cryptanalysis
Boot (V.)
Keyed-Hashing For Message Authentication
26. A layer 2 device that used to connect two or more network segments and regulate traffic.
Switches
Orange Book C Classification
Checksum
Gateway
27. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Basics Of Secure Design
Bit
File Shadowing
Tar Pits
28. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Business Interruption
Computer Forensics
Multiplexers
Data Dictionary
30. An individuals conduct that violates government laws developed to protect the public
Redundant Servers
Criminal Law
Disaster
Replication
31. A temporary public file to inform others of a compromised digital certificate
Certificate Revocation List (CRL)
Remote Access Trojan
Key Clustering
Satellite
32. A signal suggesting a system has been or is being attacked.
Convincing
Security Blueprint
Alert/Alarm
Object Oriented Programming (OOP)
33. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Checklist Test
Incident Handling
Data Warehouse
Concatenation
34. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
File Shadowing
Conflict Of Interest
IP Fragmentation
File Extension
35. Intellectual property management technique for identifying after distribution
Watermarking
Central Processing Unit (CPU)
War Driving
File Sharing
36. The core logic engine of an operating system which almost never changes
Data Recovery
War Driving
Kernel
Architecture
37. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Site Policy Awareness
Object Oriented Programming (OOP)
Strong Authentication
Memory Management
38. A backup type which creates a complete copy
Plaintext
Forensic Copy
Metadata
Replication
39. Code making
Cryptography
Archival Data
Key Clustering
Alternate Data Streams (File System Forks)
40. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Denial Of Service
Cryptology
Control
Structured Walkthrough
41. Recovery alternative - short-term - high cost movable processing location
File Extension
Mobile Site
Sequence Attacks
Physical Tampering
42. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.
Territoriality
Legacy Data
ISO/IEC 27002
Cipher Text
43. A world-wide wireless technology
Wireless Fidelity (Wi-Fi )
Education
Malformed Input
Source Routing Exploitation
44. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Recovery Time Objectives
Replication
Source Routing Exploitation
TEMPEST
45. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Moore's Law
Internal Use Only
Record Level Deletion
File Sharing
46. Recording the Who What When Where How of evidence
Chain Of Custody
Restoration
Journaling
Slack Space
47. Interception of a communication session by an attacker.
Hijacking
Privacy Laws
Legacy Data
Encipher
48. Mediation of subject and object interactions
Rollback
Access Control
Criminal Law
Near Site
49. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Administrative Law
Triage
Mirroring
Spyware
50. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Control
Reference Monitor
Restoration
Permutation /Transposition