SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A condition in which neither party is willing to stop their activity for the other to complete
Deadlock
Full-Interruption test
Patch Management
Tort
2. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Orange Book D Classification
Due Diligence
Computer System Evidence
IDS Intrusion Detection System
3. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Checklist Test (desk check)
Data Dictionary
Primary Storage
ff Site
4. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Forensic Copy
Corrective
Checklist Test
Access Point
5. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Methodical research of an incident with the purpose of finding the root cause
ff Site
Crisis
Multi-Tasking
Investigation
7. Recovery alternative - complete duplication of services including personnel
Aggregation
Access Control Lists
Dictionary Attack
Mirrored Site
8. To reduce sudden rises in current
Surge Suppressor
ISO/IEC 27002
Adware
Warm Site
9. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Physical Tampering
Crisis
User Mode (problem or program state)
Business Records
10. A programming device use in development to circumvent controls
Security Clearance
Trapdoors (Backdoors) (Maintenance Hooks)
Emergency
Birthday Attack
11. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Fraggle
Crisis
Multi-Tasking
Walk Though
12. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
File Shadowing
Trusted Computing Base
DR Or BC Coordinator
Isolation
13. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Full-Interruption test
Confidence Value
Operational Exercise
Business Recovery Timeline
14. Object reuse protection and auditing
Orange Book C2 Classification
Declaration
Due Diligence
Procedure
15. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Infrastructure
Hard Disk
Entrapment
Risk Mitigation
16. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
E-Mail Spoofing
Legacy Data
Firewall
War Dialing
17. OOP concept of a distinct copy of the class
5 Rules Of Evidence
Business Records
Residual Risk
Object
18. Specific format of technical and physical controls that support the chosen framework and the architecture
Electronic Vaulting
Infrastructure
Data Owner
Test Plan
19. Recovery alternative which outsources a business function at a cost
Workaround Procedures
Residual Risk
Service Bureau
Plain Text
20. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Legacy Data
Digital Signature
Radio Frequency Interference (RFI)
Privacy Laws
21. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Electronic Vaulting
Restoration
Proxies
Stopped
22. Mitigate damage by isolating compromised systems from the network.
Reference Monitor
Containment
Encapsulation
Routers
23. Unsolicited commercial email
Spam
Off-Site Storage
Liability
Symmetric
24. Subjects will not interact with each other's objects
Structured Walkthrough
Internal Use Only
Checksum
Non-Interference
25. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Byte Level Deletion
Labeling
Analysis
File Extension
26. To move from location to location - keeping the same function
Job Rotation
Emergency
War Dialing
Logic Bomb
27. Potentially compromising leakage of electrical or acoustical signals.
Top Secret
Emanations
Patent
Machine Language (Machine Code)
28. The hard drive
Critical Functions
Examples of technical security components
Worm
Secondary Storage
29. Uses two or more legal systems
The ACID Test
Operational Exercise
Mixed Law System
Race Condition
30. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Metadata
Declaration
Race Condition
Information Technology Security Evaluation Criteria - ITSEC
31. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Burn
Alarm Filtering
Technical Access Controls
Redundant Servers
32. A design methodology which addresses risk early and often
Exercise
Spiral
Accreditation
Mission-Critical Application
33. Another subject cannot see an ongoing or pending update until it is complete
Guidelines
Polymorphism
Monitor
Isolation
34. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Highly Confidential
Pointer
Mandatory Vacations
War Dialing
35. The chance that something negative will occur
Risk
Corrective
Honeynet
Alternate Data Streams (File System Forks)
36. A control before attack
Safeguard
Emergency
TEMPEST
Maximum Tolerable Downtime (MTD)
37. A collection of data or information that has a name
Basics Of Secure Design
Top Secret
Lattice
File
38. An alert or alarm that is triggered when no actual attack has taken place
Hub
DR Or BC Coordinator
Restoration
False (False Positive)
39. Those who initiate the attack
Restoration
Due Diligence
Cipher Text
Threat Agent
40. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Slack Space
Compression
Restoration
Enticement
41. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Injection
Multi-Processing
Archival Data
Recovery
42. Individuals and departments responsible for the storage and safeguarding of computerized data.
Data Custodian
Recovery Strategy
Databases
Multi-Processor
43. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Primary Storage
Key Escrow
Business Continuity Steering Committee
Site Policy
44. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Dangling Pointer
Data Dictionary
Remote Access Trojan
Hot Spares
45. Record of system activity - which provides for monitoring and detection.
Admissible
Log
Disaster Recovery Tape
Shadowing (file shadowing)
46. To execute more than one instruction at an instant in time
Cipher Text
Classification
Cross Certification
Multi-Processing
47. A unit of execution
Threads
Remote Access Trojan
Man-In-The-Middle Attack
Identification
48. The guardian of asset(s) - a maintenance activity
Mandatory
Recovery Period
Custodian
Birthday Attack
49. A mobilized resource purchased or contracted for the purpose of business recovery.
Surge Suppressor
Running Key
Mobile Recovery
Codec
50. More than one process in the middle of executing at a time
Multi-Tasking
Object Oriented Programming (OOP)
Dangling Pointer
Business Recovery Team