SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Countermeasure
Permutation /Transposition
Worldwide Interoperability for Microwave Access (WI-MAX )
ITSEC
2. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Fire Prevention
Data Hiding
Life Cycle of Evidence
Fire Classes
3. Planning with a goal of returning to the normal business function
Data Hiding
Critical Infrastructure
Layering
Restoration
4. To collect many small pieces of data
Cryptovariable
Aggregation
Physical Tampering
Multi-Processor
5. Encryption system using shared key/private key/single key/secret key
Tactical
Compartmentalize
Symmetric
Forensic Copy
6. Short period of low voltage.
Sag/Dip
Backup
Brouter
Checkpoint
7. Memory management technique that allows two processes to run concurrently without interaction
Isolation
Protection
Virus
Sniffing
8. Code breaking - practice of defeating the protective properties of cryptography.
System Downtime
Cryptanalysis
Alert
Hijacking
9. To assert or claim credentialing to an authentication system
Identification
Botnet
Sharing
Eavesdropping
10. Memory - RAM
Collisions
Permutation /Transposition
Trade Secret
Primary Storage
11. Joining two pieces of text
Man-In-The-Middle Attack
Operational
Concatenation
Information Flow Model
12. An asymmetric cryptography mechanism that provides authentication.
Full-Interruption test
Common Criteria
Risk Mitigation
Digital Signature
13. Memory management technique which allows data to be moved from one memory address to another
Identification
Patch Panels
Aggregation
Relocation
14. Unchecked data which spills into another location in memory
Buffer Overflow
Simulation
Accurate
Routers
15. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Hard Disk
Distributed Processing
Database Replication
Remote Journaling
16. State of computer - to be running a process
Control Type
Warm Site
Archival Data
Operating
17. Recovery alternative - complete duplication of services including personnel
Mirrored Site
Risk Assessment
Authorization
Firmware
18. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. The event signaling an IDS to produce an alarm when no attack has taken place
False Attack Stimulus
Wireless Fidelity (Wi-Fi )
Database Replication
Eavesdropping
20. A mathematical tool for verifying no unintentional changes have been made
Checksum
Atomicity
File Sharing
Conflict Of Interest
21. The study of cryptography and cryptanalysis
Criminal Law
Cryptology
Mandatory
TCSEC (Orange Book)
22. A risk assessment method - measurable real money cost
Hot Site
Security Kernel
Damage Assessment
Quantitative
23. A layer 2 device that used to connect two or more network segments and regulate traffic.
Cross Certification
Denial Of Service
Mission-Critical Application
Switches
24. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Collisions
Radio Frequency Interference (RFI)
Access Control Matrix
Smurf
25. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Orange Book C Classification
Byte Level Deletion
Fragmented Data
Binary
26. The first rating that requires security labels
Distributed Processing
Worm
Adware
Orange Book B1 Classification
27. Try a list of words in passwords or encryption keys
MOM
Simulation Test
Dictionary Attack
Remanence
28. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
File Extension
Hot Site
Checksum
Business Recovery Team
29. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
War Dialing
Cookie
Hearsay Evidence
Strategic
30. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Discretionary Access Control (DAC)
Degauss
Critical Functions
Twisted Pair
31. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Crisis
Locard's Principle
Classification
Orange Book C Classification
32. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Guidelines
Off-Site Storage
Phishing
Disaster Recovery Teams (Business Recovery Teams)
33. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Radio Frequency Interference (RFI)
Incident Response Team
Cross Training
Consistency
34. For PKI - to store another copy of a key
Key Escrow
Supervisor Mode (monitor - system - privileged)
Complete
Data Marts
35. Intellectual property protection for an confidential and critical process
Trade Secret
Central Processing Unit (CPU)
Structured Walk-Through Test
Kerberos
36. Mediation of covert channels must be addressed
Information Flow Model
Interception
Journaling
Lattice
37. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Threats
Parallel Test
Desk Check Test
Spam
38. To smooth out reductions or increases in power
Botnet
Security Blueprint
Site Policy Awareness
UPS
39. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Risk Mitigation
Interception
Discretionary
Orange Book D Classification
40. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Disk Mirroring
Steganography
Common Law
Central Processing Unit (CPU)
41. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Open Mail Relay Servers
Forensic Copy
Business Records
Tort
42. System mediation of access with the focus on the context of the request
Technical Access Controls
Authentic
Content Dependent Access Control
BCP Testing Drills and Exercises
43. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Business Continuity Steering Committee
Inheritance
Access Control Lists
Logic Bomb
44. Something that happened
Faraday Cage/ Shield
Security Blueprint
Event
Cryptology
45. The core logic engine of an operating system which almost never changes
Kernel
Targeted Testing
Databases
Business Interruption Insurance
46. A secure connection to another network.
Gateway
Cryptography
Containment
MOM
47. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Virtual Memory
Key Space
Cryptovariable
Change Control
48. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
Integrated Test
Pervasive Computing and Mobile Computing Devices
Physical Tampering
TNI (Red Book)
49. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Warm Site
Walk Though
Recovery
MOM
50. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Convincing
Mirroring
Civil Law
Mandatory Access Control (MAC)