SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Written step-by-step actions
Secondary Storage
Exercise
Job Training
Procedure
2. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Waterfall
Administrative Law
Procedure
Mandatory Access Control (MAC)
3. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Metadata
Overlapping Fragment Attack
Remanence
One Time Pad
4. Eight bits.
Aggregation
Storage Area Network (SAN)
Test Plan
Byte
5. Less granular organization of controls -
Fault Tolerance
Smurf
Control Type
Sampling
6. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Investigation
Alarm Filtering
Double Blind Testing
Alert/Alarm
7. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Pointer
Business Interruption
Orange Book C Classification
Cryptography
8. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Pointer
Checklist Test
Rogue Access Points
Exercise
9. Scrambled form of the message or data
Record Level Deletion
User
Cipher Text
File Sharing
10. Planning with a goal of returning to the normal business function
Restoration
Chain Of Custody
Business Recovery Team
Security Domain
11. A disturbance that degrades performance of electronic devices and electronic communications.
Non-Discretionary Access Control
Framework
Radio Frequency Interference (RFI)
IDS Intrusion Detection System
12. Natural occurrence in circuits that are in close proximity
Intrusion Prevention Systems
Object Reuse
Interference (Noise)
Due Diligence
13. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Recovery Strategy
Non-Repudiation
Emanations
Civil Law
14. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Civil Law
Journaling
Near Site
Slack Space
15. A form of data hiding which protects running threads of execution from using each other's memory
Restoration
Process Isolation
Centralized Access Control Technologies
Deadlock
16. Descrambling the encrypted message with the corresponding key
Decipher
Initialization Vector
Sharing
ISO/IEC 27002
17. Something that happened
Access Control Attacks
False (False Positive)
Event
Active Data
18. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Alert
The ACID Test
Technical Access Controls
Remote Journaling
19. A record that must be preserved and available for retrieval if needed.
Vital Record
Maximum Tolerable Downtime (MTD)
Multi-Tasking
Database Replication
20. Just enough access to do the job
Fire Classes
Least Privilege
Multiplexers
Instance
21. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Top Secret
Chain Of Custody
Fault Tolerance
Identification
22. May be responsible for overall recovery of an organization or unit(s).
Residual Risk
Backup
Firmware
DR Or BC Coordinator
23. Responsibility for actions
IP Address Spoofing
File Level Deletion
Liability
Digital Signature
24. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Separation Of Duties
Coaxial Cable
TCSEC (Orange Book)
Binary
25. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Metadata
Least Privilege
Certification Authority
Contingency Plan
26. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Trusted Computing Base
Twisted Pair
Liability
Security Kernel
27. A type a computer memory that temporarily stores frequently used information for quick access.
Business Continuity Steering Committee
Plan Maintenance Procedures
Critical Infrastructure
Cache
28. System of law based upon what is good for society
Civil Or Code Law
Encapsulation
Orange Book B2 Classification
Interpreter
29. Power surge
Multilevel Security System
Electrostatic Discharge
Primary Storage
Workaround Procedures
30. Mitigation of system or component loss or interruption through use of backup capability.
Man-In-The-Middle Attack
High-Risk Areas
Countermeasure
Fault Tolerance
31. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Vulnerability
Resumption
Repeaters
Switches
32. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Monitor
Brouter
Tapping
CPU Cache
33. Recovery alternative - everything needed for the business function - except people and last backup
Business Continuity Program
Control Category
Relocation
Hot Site
34. The collection and summation of risk data relating to a particular asset and controls for that asset
SQL Injection
Firewalls
Risk Assessment
Compression
35. Mediation of subject and object interactions
Remote Journaling
Access Control
Trade Secret
Data Leakage
36. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Shadowing (file shadowing)
Interpreter
Open Mail Relay Servers
Kerberos
37. Intellectual property protection for marketing efforts
Accreditation
Checklist Test
Qualitative
Trademark
38. Part of a transaction control for a database which informs the database of the last recorded transaction
Threads
Checkpoint
Ring Protection
Mitigate
39. Of a system without prior knowledge by the tester or the tested
Discretionary Access Control (DAC)
Double Blind Testing
Plaintext
EMI
40. Granular decision by a system of permitting or denying access to a particular resource on the system
Locard's Principle
Authorization
Information Technology Security Evaluation Criteria - ITSEC
Orange Book C Classification
41. Creation distribution update and deletion
Rootkit
Remote Journaling
Need-To-Know
Key Management
42. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Overlapping Fragment Attack
Proxies
Sniffing
ff Site
43. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Technical Access Controls
Civil Or Code Law
Bollard
Data Dictionary
44. A Denial of Service attack that floods the target system with connection requests that are not finalized.
SYN Flooding
Change Control
Restoration
Discretionary Access Control (DAC)
45. A backup type - for databases at a point in time
Kerberos
Shadowing (file shadowing)
Access Point
Security Blueprint
46. A condition in which neither party is willing to stop their activity for the other to complete
Public Key Infrastructure (PKI)
Surge
Emanations
Deadlock
47. Control category - more than one control on a single asset
TEMPEST
Compensating
Business Continuity Steering Committee
Site Policy Awareness
48. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Data Recovery
Test Plan
Assembler
Teardrop
49. Code breaking - practice of defeating the protective properties of cryptography.
Hijacking
Cryptanalysis
Multi-Programming
Multi-Core
50. A back up type - where the organization has excess capacity in another location.
Certificate Revocation List (CRL)
Multi-Core
Mission-Critical Application
Distributed Processing