SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A choice in risk management - to convince another to assume risk - typically by payment
Transfer
Intrusion Detection Systems
Overlapping Fragment Attack
IP Fragmentation
2. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
System Downtime
Civil Or Code Law
Business Recovery Timeline
Residual Risk
3. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Spiral
Complete
Spyware
Classification
4. A world-wide wireless technology
Wireless Fidelity (Wi-Fi )
Disk Mirroring
Sniffing
Gateway
5. Process of statistically testing a data set for the likelihood of relevant information.
Sampling
ISO/IEC 27001
Mitigate
Exercise
6. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Entrapment
Logic Bomb
Executive Succession
Operational Impact Analysis
7. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
2-Phase Commit
Malformed Input
Digital Signature
TCSEC (Orange Book)
8. Evaluation of a system without prior knowledge by the tester
Orange Book A Classification
Simulation
Blind Testing
Double Blind Testing
9. Substitution at the word or phrase level
Open Mail Relay Servers
Injection
Code
Work Factor
10. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Non-Discretionary Access Control
Encapsulation
Non-Repudiation
Metadata
11. Malware that makes small random changes to many data points
Data Diddler
Cross-Site Scripting
Business Recovery Team
Access Control Matrix
12. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Code
Information Technology Security Evaluation Criteria - ITSEC
Mission-Critical Application
Risk Assessment / Analysis
13. Control category- to discourage an adversary from attempting to access
Archival Data
Intrusion Detection Systems
Deterrent
Failure Modes and Effect Analysis (FEMA)
14. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Initialization Vector
File Sharing
Sampling
Electrostatic Discharge
15. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Elements of Negligence
Full Test (Full Interruption)
Remote Journaling
Quantitative
16. An asymmetric cryptography mechanism that provides authentication.
DR Or BC Coordinator
Archival Data
Digital Signature
On-Site
17. Object based description of a single resource and the permission each subject
Access Control Lists
Work Factor
Concentrator
Man-In-The-Middle Attack
18. A type of attack involving attempted insertion - deletion or altering of data.
Non-Discretionary Access Control
Copyright
Modification
Quantitative Risk Analysis
19. A documented battle plan for coordinating response to incidents.
Electronic Vaulting
Cryptology
War Dialing
Incident Handling
20. Actions measured against either a policy or what a reasonable person would do
Phishing
Risk Assessment / Analysis
Incident Manager
Due Diligence
21. An image compression standard for photographs
Residual Data
JPEG (Joint Photographic Experts Group)
Guidelines
Redundant Array Of Independent Drives (RAID)
22. To reduce fire
Hot Site
Fire Suppression
Mobile Site
Kernel
23. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Simulation Test
Site Policy Awareness
Civil Or Code Law
Corrective
24. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Mock Disaster
CobiT
Public Key Infrastructure (PKI)
Sampling
25. A device that provides the functions of both a bridge and a router.
Recovery
Brouter
Identification
SQL Injection
26. Summary of a communication for the purpose of integrity
Message Digest
Notification
Inrush Current
Man-In-The-Middle Attack
27. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Birthday Attack
Interception
Mandatory Vacations
Incident Response
28. Recovery alternative - complete duplication of services including personnel
Sequence Attacks
Mirrored Site
Structured Walkthrough
Framework
29. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Multi-Programming
Databases
Certificate Revocation List (CRL)
Preemptive
30. A type of multitasking that allows for more even distribution of computing time among competing request
Tactical
Preemptive
Brownout
Key Clustering
31. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Buffer Overflow
Memory Management
Encipher
Injection
32. A process state - to be executing a process on the CPU
Message Digest
Running
Proprietary
Inheritance
33. Controls for termination of attempt to access object
User Mode (problem or program state)
Intrusion Prevention Systems
Emergency Operations Center (EOC)
Site Policy
34. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Corrective
Access Control Attacks
Burn
Standalone Test
35. More than one CPU on a single board
Spiral
Access Point
Reference Monitor
Multi-Core
36. To jump to a conclusion
Fault
Lattice
Inference
True Attack Stimulus
37. A temporary public file to inform others of a compromised digital certificate
Fire Classes
Warm Site
Certificate Revocation List (CRL)
Embedded
38. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Masked/Interruptible
Voice Over IP (VOIP)
Capability Tables
Initialization Vector
39. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Forensic Copy
Spam
Sampling
Journaling
40. An attack involving the hijacking of a TCP session by predicting a sequence number.
Access Control Lists
Sequence Attacks
Crisis
Noise
41. Property that data is represented in the same manner at all times
Analysis
Consistency
Business Continuity Planning (BCP)
Trademark
42. To know more than one job
Cross Training
Quantitative Risk Analysis
Off-Site Storage
Multi-Party Control
43. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Business Recovery Team
Cipher Text
Patent
Governance
44. Total number of keys available that may be selected by the user of a cryptosystem
Key Space
Disaster Recovery Tape
Cold Site
Open Mail Relay Servers
45. Vehicle stopping object
Firmware
Voice Over IP (VOIP)
Bollard
Business Recovery Team
46. A description of a database
Log
Mission-Critical Application
Alert/Alarm
Data Dictionary
47. A layer 3 device that used to connect two or more network segments and regulate traffic.
Brute Force
Intrusion Prevention Systems
Integrated Test
Routers
48. Induces a crime - tricks a person - and is illegal
Multiplexers
Chain of Custody
Double Blind Testing
Entrapment
49. A backup type - for databases at a point in time
Shadowing (file shadowing)
War Dialing
Private Branch Exchange (PBX)
Infrastructure
50. One way encryption
Data Backups
Hash Function
Database Shadowing
Fragmented Data