SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Planning with a goal of returning to the normal business function
Man-In-The-Middle Attack
Routers
Mission-Critical Application
Restoration
2. Momentary loss of power
Call Tree
True Attack Stimulus
Fault
Attacker (Black hat - Hacker)
3. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Embedded Systems
Non-Discretionary Access Control
Custodian
Electrostatic Discharge
4. A database backup type which records at the transaction level
E-Mail Spoofing
Class
Kerckhoff's Principle
Remote Journaling
5. Mathematical function that determines the cryptographic operations
Threat Agent
Declaration
Common Criteria
Algorithm
6. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Network Attached Storage (NAS)
Symmetric
Recovery Strategy
Patch Panels
7. Some systems are actually run at the alternate site
Switches
Binary
Parallel Test
Distributed Processing
8. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Multilevel Security System
Checkpoint
Teardrop
Polymorphism
9. Is secondhand and usually not admissible in court
Security Domain
Sharing
Hearsay Evidence
Database Replication
10. Malware that subverts the detective controls of an operating system
Rootkit
Plain Text
Protection
Standard
11. Actions measured against either a policy or what a reasonable person would do
Deterrent
Incident Manager
Due Diligence
Parallel Test
12. Requirement to take time off
Total Risk
Mandatory Vacations
Locard's Principle
Multi-Programming
13. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Discretionary Access Control (DAC)
Business Records
Multi-Programming
Shielding
14. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Degauss
Legacy Data
Masquerading
Encryption
15. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
Sampling
Need-To-Know
Computer Forensics
TEMPEST
16. Lower frequency noise
Structured Walkthrough
Durability
Critical Functions
Radio Frequency Interference (RFI)
17. The collection and summation of risk data relating to a particular asset and controls for that asset
Control Category
Highly Confidential
Sequence Attacks
Risk Assessment
18. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Data Warehouse
Byte Level Deletion
Key Management
Rogue Access Points
19. Process of statistically testing a data set for the likelihood of relevant information.
Active Data
Sampling
Deterrent
Liability
20. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Data Diddler
Business Unit Recovery
Policy
Modems
21. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Fire Classes
Disaster Recovery Plan
Redundant Array Of Independent Drives (RAID)
Polymorphism
22. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Object Oriented Programming (OOP)
Cipher Text
Examples of non-technical security components
Masked/Interruptible
23. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Guidelines
Botnet
Civil Law
Fault Tolerance
24. To load the first piece of software that starts a computer.
Boot (V.)
Electronic Vaulting
Disaster
Primary Storage
25. Intermediate level - pertaining to planning
Business Continuity Steering Committee
Patch Panels
Operational
Brownout
26. Record of system activity - which provides for monitoring and detection.
Life Cycle of Evidence
Enticement
Log
Brute Force
27. Deals with discretionary protection
Orange Book C Classification
Cryptovariable
Hacker
Notification
28. People who interact with assets
Business Records
User
Criminal Law
Memory Management
29. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
30. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Keystroke Logging
File Sharing
Orange Book D Classification
TIFF (Tagged Image File Format)
31. What is will remain - persistence
Warm Site
Backup
Durability
Mandatory Vacations
32. Moving the alphabet intact a certain number spaces
Transfer
Alternate Data Streams (File System Forks)
Tort
Shift Cipher (Caesar)
33. The core of a computer that calculates
Monitor
Mirrored Site
Central Processing Unit (CPU)
Event
34. Line noise that is superimposed on the supply circuit.
Packet Filtering
Transients
Aggregation
Spyware
35. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Business Continuity Program
Rootkit
Examples of non-technical security components
Microwave
36. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Public Key Infrastructure (PKI)
Life Cycle of Evidence
Degauss
Smurf
37. Intellectual property protection for the expression of an idea
Notification
Copyright
Sniffing
Trade Secret
38. Intellectual property protection for marketing efforts
Emergency Procedures
E-Mail Spoofing
Microwave
Trademark
39. One way encryption
Key Escrow
Dangling Pointer
Content Dependent Access Control
Hash Function
40. Forging of an IP address.
Executive Succession
Cross-Site Scripting
IP Address Spoofing
Alarm Filtering
41. Regular operations are stopped and where processing is moved to the alternate site.
One Time Pad
Full-Interruption test
Operational Impact Analysis
Instance
42. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Cryptanalysis
Mobile Recovery
Redundant Servers
Steganography
43. Intellectual property management technique for identifying after distribution
Watermarking
Certificate Revocation List (CRL)
Coaxial Cable
Masquerading
44. A mathematical tool for verifying no unintentional changes have been made
Legacy Data
Checksum
Redundant Servers
Rogue Access Points
45. Potential danger to information or systems
Failure Modes and Effect Analysis (FEMA)
Chain Of Custody
Byte Level Deletion
Threats
46. Used to code/decode a digital data stream.
Codec
Guidelines
5 Rules Of Evidence
Covert Channel
47. Pertaining to law - accepted by a court
Tactical
Admissible
Storage Area Network (SAN)
Data Leakage
48. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Orange Book A Classification
Highly Confidential
Criminal Law
Checklist Test
49. Information about data or records
Journaling
Metadata
Quantitative Risk Analysis
SQL Injection
50. Scrambled form of the message or data
Cipher Text
Recovery Point Objective (RPO)
Civil Or Code Law
TCSEC (Orange Book)