SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Operational Test
Pervasive Computing and Mobile Computing Devices
Malformed Input
Declaration
2. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Firewalls
Resumption
Virtual Memory
Evidence
3. To reduce fire
Cryptology
Twisted Pair
Criminal Law
Fire Suppression
4. An alert or alarm that is triggered when no actual attack has taken place
Collisions
Risk Mitigation
Information Owner
False (False Positive)
5. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Emergency Operations Center (EOC)
Virtual Memory
Cryptanalysis
6. A disturbance that degrades performance of electronic devices and electronic communications.
Secondary Storage
Elements of Negligence
Radio Frequency Interference (RFI)
Standard
7. To reduce sudden rises in current
Surge Suppressor
Mobile Site
Common Law
Mobile Recovery
8. Just enough access to do the job
Electronic Vaulting
Centralized Access Control Technologies
Executive Succession
Least Privilege
9. A process state - (blocked) needing input before continuing
Recovery Strategy
Storage Area Network (SAN)
Wait
Activation
10. Someone who want to know how something works - typically by taking it apart
Hacker
Metadata
Eavesdropping
Modification
11. Quantity of risk remaining after a control is applied
Mobile Recovery
Residual Risk
Authentic
Physical Tampering
12. Claiming another's identity at a physical level
Masquerading
Common Law
Trusted Computing Base
Symmetric
13. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Microwave
Public Key Infrastructure (PKI)
Threats
Mixed Law System
14. Searching for wireless networks in a moving car.
Data Custodian
Decipher
Data Leakage
War Driving
15. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Activation
Network Attached Storage (NAS)
Job Training
Computer System Evidence
16. Encryption system using shared key/private key/single key/secret key
Symmetric
Botnet
Central Processing Unit (CPU)
DR Or BC Coordinator
17. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Man-In-The-Middle Attack
Strong Authentication
CPU Cache
JPEG (Joint Photographic Experts Group)
18. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Plaintext
Recovery
Site Policy
Fragmented Data
19. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Repeaters
Decipher
Administrative
Business Impact Analysis
20. A computer designed for the purpose of studying adversaries
Atomicity
Desk Check Test
Honeypot
Information Owner
21. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Patch Panels
Elements of Negligence
Information Risk Management (IRM)
Fire Suppression
22. A mobilized resource purchased or contracted for the purpose of business recovery.
Policy
Work Factor
Birthday Attack
Mobile Recovery
23. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Fire Detection
Contact List
Content Dependent Access Control
IDS Intrusion Detection System
24. Descrambling the encrypted message with the corresponding key
Decipher
Remote Journaling
Encipher
Secondary Storage
25. Regular operations are stopped and where processing is moved to the alternate site.
Operational
Full-Interruption test
Mirroring
File Level Deletion
26. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
Control Type
MOM
Layering
Overlapping Fragment Attack
27. Recovery alternative - short-term - high cost movable processing location
Emergency Procedures
Physical Tampering
Mobile Site
Data Integrity
28. Forgery of the sender's email address in an email header.
Data Backups
Business Unit Recovery
Incident
E-Mail Spoofing
29. A design methodology which addresses risk early and often
Rollback
Noise
Cross-Site Scripting
Spiral
30. Natural occurrence in circuits that are in close proximity
Interference (Noise)
Sag/Dip
Deadlock
Data Custodian
31. A collection of information designed to reduce duplication and increase integrity
Declaration
Hearsay
Databases
Activation
32. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Information Risk Management (IRM)
Method
Education
Acronym for American Standard Code for Information Interchange (ASCII)
33. Reduction of voltage by the utility company for a prolonged period of time
Brownout
Mock Disaster
Multi-Tasking
Electronic Vaulting
34. Record history of incident
Vulnerability
Multi-Core
Tracking
Intrusion Detection Systems
35. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Orange Book D Classification
Computer System Evidence
Source Routing Exploitation
Man-In-The-Middle Attack
36. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Policy
Virtual Memory
Integrated Test
CobiT
37. Objects or programming that looks the different but act same
Directive
Near Site
Alternate Site
Polymorphism
38. Written core statements that rarely change
Object
UPS
BCP Testing Drills and Exercises
Policy
39. DoS - Spoofing - dictionary - brute force - wardialing
Maximum Tolerable Downtime (MTD)
Transients
Access Control Attacks
Hearsay Evidence
40. Property that data is represented in the same manner at all times
SQL Injection
Education
Notification
Consistency
41. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Recovery Point Objective (RPO)
Access Control
Accreditation
Burn
42. A layer 3 device that used to connect two or more network segments and regulate traffic.
Cache
Log
User
Routers
43. Wrong against society
Operating
MOM
Birthday Attack
Criminal Law
44. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Disaster Recovery Teams (Business Recovery Teams)
Top Secret
Logic Bomb
Residual Risk
45. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Machine Language (Machine Code)
Safeguard
Non-Discretionary Access Control
On-Site
46. The connection between a wireless and wired network.
Service Bureau
Access Point
Maximum Tolerable Downtime (MTD)
Common Law
47. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Distributed Processing
Business Recovery Team
Recovery Period
Operational Impact Analysis
48. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Triage
Recovery Strategy
Encryption
War Dialing
49. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Cipher Text
Redundant Servers
Interference (Noise)
Deadlock
50. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Mixed Law System
Life Cycle of Evidence
Mirrored Site
Integrated Test