SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OOP concept of a distinct copy of the class
On-Site
Recovery Period
Change Control
Object
2. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Identification
Top Secret
Administrative Access Controls
Disaster
3. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Mobile Recovery
Tar Pits
Structured Walk-Through Test
War Dialing
4. An availability attack - to consume resources to the point of exhaustion
Conflict Of Interest
Switches
Denial Of Service
Interception
5. Object based description of a single resource and the permission each subject
Cold Site
Compiler
Access Control Lists
Cookie
6. System of law based upon what is good for society
Checklist Test (desk check)
Surge Suppressor
Civil Or Code Law
Incident Response
7. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
MOM
Ring Protection
Total Risk
Data Diddler
8. A process state - (blocked) needing input before continuing
Twisted Pair
Wait
Mock Disaster
Business Continuity Planning (BCP)
9. Intellectual property management technique for identifying after distribution
Inrush Current
Initialization Vector
On-Site
Watermarking
10. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Test Plan
Site Policy
Deadlock
Incident Handling
11. Mathematical function that determines the cryptographic operations
Noise
Algorithm
Standard
Substitution
12. Business and technical process of applying security software updates in a regulated periodic way
Patch Management
Twisted Pair
Detection
TCSEC (Orange Book)
13. High degree of visual control
Surveillance
Disaster Recovery Plan
Stopped
Examples of non-technical security components
14. Another subject cannot see an ongoing or pending update until it is complete
Data Hiding
Incident Response Team
Isolation
Architecture
15. Forging of an IP address.
Remote Journaling
IP Address Spoofing
Open Mail Relay Servers
Mandatory Vacations
16. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
BCP Testing Drills and Exercises
Generator
Plan Maintenance Procedures
Multilevel Security System
17. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Criminal Law
Secondary Storage
Administrative Laws
Orange Book D Classification
18. The managerial approval to operate a system based upon knowledge of risk to operate
Multi-Processor
Enticement
Total Risk
Accreditation
19. For PKI - decertify an entities certificate
Overlapping Fragment Attack
Encipher
Revocation
Multi-Tasking
20. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Business Continuity Planning (BCP)
Data Recovery
Fire Detection
Archival Data
21. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Burn
Tort
Multilevel Security System
Strategic
22. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Waterfall
TNI (Red Book)
Disaster Recovery Teams (Business Recovery Teams)
Transfer
23. Recovery alternative which outsources a business function at a cost
Internal Use Only
Education
One Time Pad
Service Bureau
24. Reduction of voltage by the utility company for a prolonged period of time
Monitor
Brownout
Replication
War Dialing
25. RADIUS - TACACS+ - Diameter
Data Diddler
Centralized Access Control Technologies
Satellite
Incident Manager
26. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Common Criteria
Virtual Memory
Hub
Digital Certificate
27. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Crisis
Restoration
Firewalls
Multi-Programming
28. Recording the Who What When Where How of evidence
Cryptology
Embedded Systems
SYN Flooding
Chain Of Custody
29. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
War Dialing
Damage Assessment
Risk
Basics Of Secure Design
30. Trading one for another
Decipher
Consistency
Open Mail Relay Servers
Substitution
31. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
3 Types of harm Addressed in computer crime laws
Buffer Overflow
Remote Journaling
Quantitative
32. Collection of data on business functions which determines the strategy of resiliency
Architecture
Separation Of Duties
Remote Journaling
Business Impact Assessment (BIA)
33. To evaluate the current situation and make basic decisions as to what to do
Triage
DR Or BC Coordinator
Firewall
Data Integrity
34. Provides a physical cross connect point for devices.
Cryptovariable
Patch Panels
Activation
Forward Recovery
35. Potentially retrievable data residue that remains following intended erasure of data.
Business Continuity Steering Committee
Vulnerability
Remanence
Analysis
36. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Business Recovery Team
File Extension
Botnet
IP Address Spoofing
37. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Ring Protection
Spiral
The ACID Test
Disaster Recovery Teams (Business Recovery Teams)
38. A copy of transaction data - designed for querying and reporting
Patch Panels
Life Cycle of Evidence
Data Warehouse
Mandatory Vacations
39. Intellectual property protection for an confidential and critical process
Data Custodian
Trade Secret
Codec
Plain Text
40. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Kerberos
Class
Moore's Law
False (False Positive)
41. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Adware
Resumption
Directive
Executive Succession
42. A covert storage channel on the file attribute
Alternate Data Streams (File System Forks)
Residual Risk
Capability Tables
Orange Book B2 Classification
43. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Access Control
Database Shadowing
Alert
Teardrop
44. A collection of data or information that has a name
Deterrent
Administrative
Civil Law
File
45. An event which stops business from continuing.
Integrated Test
Quantitative Risk Analysis
Patch Panels
Disaster
46. A design methodology which addresses risk early and often
Top Secret
SQL Injection
Spiral
Orange Book D Classification
47. Creation distribution update and deletion
Key Management
Accurate
Attacker (Black hat - Hacker)
Vulnerability
48. Line noise that is superimposed on the supply circuit.
Electronic Vaulting
Burn
Log
Transients
49. Eight bits.
Teardrop
Work Factor
Byte
Access Control Lists
50. Controls deployed to avert unauthorized and/or undesired actions.
Brownout
Desk Check Test
Trapdoors (Backdoors) (Maintenance Hooks)
Prevention