SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification
Executive Succession
Targeted Testing
Monitor
2. Another subject cannot see an ongoing or pending update until it is complete
Discretionary
HTTP Response Splitting
Isolation
Education
3. Something that happened
Security Clearance
Event
Mantrap (Double Door System)
Malformed Input
4. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Data Hiding
Hot Site
Tar Pits
Failure Modes and Effect Analysis (FEMA)
5. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Computer Forensics
Transients
Uninterruptible Power Supply (UPS)
Source Routing Exploitation
6. One entity with two competing allegiances
Conflict Of Interest
5 Rules Of Evidence
State Machine Model
Prevention
7. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
BCP Testing Drills and Exercises
Call Tree
Cookie
Deletion
8. Written step-by-step actions
Isolation
Masked/Interruptible
Mandatory Vacations
Procedure
9. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Backup
Reciprocal Agreement
Restoration
Fragmented Data
10. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Mandatory Access Control (MAC)
Application Programming Interface
Embedded Systems
Fraggle
11. A shield against leakage of electromagnetic signals.
Monitor
Faraday Cage/ Shield
Incident Response
Blind Testing
12. Induces a crime - tricks a person - and is illegal
Data Backups
Guidelines
Entrapment
MOM
13. Regular operations are stopped and where processing is moved to the alternate site.
Least Privilege
Full-Interruption test
Legacy Data
Plan Maintenance Procedures
14. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Faraday Cage/ Shield
Permutation /Transposition
Kerckhoff's Principle
15. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Shift Cipher (Caesar)
Chain of Custody
Worldwide Interoperability for Microwave Access (WI-MAX )
Data Backup Strategies
16. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Object
Test Plan
Tort
Compression
17. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Checkpoint
Race Condition
Distributed Denial Of Service
Salami
18. An alert or alarm that is triggered when no actual attack has taken place
False (False Positive)
Spyware
Threads
Territoriality
19. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Logic Bomb
Classification
Desk Check Test
Kernel
20. The hard drive
Boot (V.)
Secondary Storage
Double Blind Testing
Residual Risk
21. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Failure Modes and Effect Analysis (FEMA)
Distributed Denial Of Service
Risk Assessment / Analysis
MOM
22. A process state - to be either be unable to run waiting for an external event or terminated
Patch Management
Adware
Stopped
Coaxial Cable
23. A electronic attestation of identity by a certificate authority
Digital Certificate
Technical Access Controls
Tort
Journaling
24. A device that converts between digital and analog representation of data.
Modems
Chain of Custody
Adware
Plain Text
25. Tool which mediates access
Noise
Control
Orange Book C2 Classification
Authentication
26. Scrambled form of the message or data
Application Programming Interface
State Machine Model
Tapping
Cipher Text
27. Weak evidence
Message Digest
Operational Impact Analysis
Hearsay
Criminal Law
28. Moving letters around
Permutation /Transposition
Checklist Test (desk check)
Keystroke Logging
Trademark
29. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Checklist Test (desk check)
Complete
Hard Disk
File Shadowing
30. A collection of data or information that has a name
Computer Forensics
File
Instance
Residual Risk
31. To load the first piece of software that starts a computer.
Boot (V.)
Embedded Systems
Security Domain
Stopped
32. Pertaining to law - accepted by a court
Administrative Law
Admissible
Instance
Uninterruptible Power Supply (UPS)
33. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Acronym for American Standard Code for Information Interchange (ASCII)
Multi-Programming
Liability
Shift Cipher (Caesar)
34. Responsibility of a user for the actions taken by their account which requires unique identification
Capability Tables
Threads
Accountability
Mobile Site
35. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Smurf
JPEG (Joint Photographic Experts Group)
Watermarking
Dictionary Attack
36. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Common Law
Information Risk Management (IRM)
Electromagnetic Interference (EMI)
Confidence Value
37. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Legacy Data
Watermarking
Quantitative Risk Analysis
Alert/Alarm
38. Statistical probabilities of a collision are more likely than one thinks
Birthday Attack
Key Clustering
Wireless Fidelity (Wi-Fi )
Open Mail Relay Servers
39. Information about a particular data set
Inference
Parallel Test
Metadata
Operational
40. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
False Negative
Data Leakage
File
Proxies
41. A group or network of honeypots
Fraggle
Authorization
Honeynet
Governance
42. A hash that has been further encrypted with a symmetric algorithm
Keyed-Hashing For Message Authentication
Life Cycle of Evidence
Plaintext
Policy
43. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Trusted Computing Base
Object
SQL Injection
Simulation Test
44. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Containment
Test Plan
Recovery
Highly Confidential
45. More than one CPU on a single board
Multi-Core
Object Oriented Programming (OOP)
Declaration
Access Control Attacks
46. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Ring Protection
Payload
Injection
Admissible
47. Requirement to take time off
Mandatory Vacations
Concatenation
Mobile Recovery
Fire Classes
48. To move from location to location - keeping the same function
Dangling Pointer
Secondary Storage
Job Rotation
Examples of technical security components
49. A type of multitasking that allows for more even distribution of computing time among competing request
Bridge
Method
Recovery
Preemptive
50. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Hub
Directive
Electronic Vaulting
High-Risk Areas