SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Joining two pieces of text
Recovery
IP Fragmentation
Concatenation
Detective
2. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Crisis
Contingency Plan
Supervisor Mode (monitor - system - privileged)
Access Control Lists
3. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Test Plan
Framework
IP Fragmentation
Moore's Law
4. A choice in risk management - to implement a control that limits or lessens negative effects
Fragmented Data
Access Control Lists
Standard
Mitigate
5. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Fiber Optics
Generator
CPU Cache
Technical Access Controls
6. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Cookie
Business Impact Analysis
Cold Site
Information Technology Security Evaluation Criteria - ITSEC
7. Written suggestions that direct choice to a few alternatives
Guidelines
Domain
Operational
Cryptovariable
8. Natural occurrence in circuits that are in close proximity
Interference (Noise)
Data Dictionary
Cipher Text
Quantitative
9. Quantity of risk remaining after a control is applied
Site Policy
Interference (Noise)
Standard
Residual Risk
10. A subnetwork with storage devices servicing all servers on the attached network.
Storage Area Network (SAN)
Collisions
Time Of Check/Time Of Use
Vulnerability
11. System directed mediation of access with labels
Cross Training
Entrapment
Mandatory
Interpreter
12. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Privacy Laws
Mixed Law System
Non-Interference
CobiT
13. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Off-Site Storage
On-Site
Full Test (Full Interruption)
Surge
14. Control category- to record an adversary's actions
Multi-Party Control
The ACID Test
Detective
Compression
15. Encryption system using a pair of mathematically related unequal keys
Multi-Programming
3 Types of harm Addressed in computer crime laws
Asymmetric
Multi-Processor
16. Ertaining to a number system that has just two unique digits.
Binary
Physical Tampering
User
Civil Or Code Law
17. Location where coordination and execution of BCP or DRP is directed
CobiT
Time Of Check/Time Of Use
Emergency Operations Center (EOC)
Cookie
18. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Disaster
Fire Suppression
Repeaters
Eavesdropping
19. A device that converts between digital and analog representation of data.
Trusted Computing Base
Byte Level Deletion
Distributed Denial Of Service
Modems
20. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Crisis
Open Mail Relay Servers
Restoration
Honeynet
21. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
File Server
Full-Interruption test
Elements of Negligence
Mission-Critical Application
22. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Encapsulation
Disk Mirroring
Admissible
Near Site
23. Recovery alternative - complete duplication of services including personnel
Database Replication
Hearsay Evidence
Remanence
Mirrored Site
24. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Tapping
Information Technology Security Evaluation Criteria - ITSEC
Executive Succession
Evidence
25. People who interact with assets
Ethics
User
Liability
Data Hiding
26. To reduce fire
Repeaters
Fire Suppression
Tort
Maximum Tolerable Downtime (MTD)
27. A disturbance that degrades performance of electronic devices and electronic communications.
Restoration
Radio Frequency Interference (RFI)
Business Impact Analysis
Mobile Site
28. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Pointer
Business Interruption Insurance
Event
False Attack Stimulus
29. Using many alphabets
Database Replication
Polyalphabetic
Mobile Recovery
Information Owner
30. A computer designed for the purpose of studying adversaries
Lattice
Consistency
Honeypot
Work Factor
31. Communication of a security incident to stakeholders and data owners.
Separation Of Duties
Collisions
Classification
Notification
32. Review of data
True Attack Stimulus
Dictionary Attack
Analysis
Inrush Current
33. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Sag/Dip
Hard Disk
Multi-Processing
BCP Testing Drills and Exercises
34. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Business Unit Recovery
Multiplexers
Encryption
Cryptography
35. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Open Mail Relay Servers
File Shadowing
Simulation
Civil Law
36. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Denial Of Service
Data Dictionary
Administrative Laws
Tracking
37. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Processes are Isolated By
Packet Filtering
Threats
High-Risk Areas
38. Property that data is represented in the same manner at all times
Interpreter
Memory Management
Access Control Lists
Consistency
39. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Dangling Pointer
Threat Agent
Contact List
Classification
40. Written core statements that rarely change
Policy
Activation
E-Mail Spoofing
Digital Signature
41. Recovery alternative which outsources a business function at a cost
Service Bureau
Open Mail Relay Servers
Routers
Orange Book C Classification
42. Consume resources to a point of exhaustion - loss of availability
Modification
Shadowing (file shadowing)
Denial Of Service
Triage
43. Using small special tools all tumblers of the lock are aligned - opening the door
Brouter
Picking
Certification Authority
Life Cycle of Evidence
44. To execute more than one instruction at an instant in time
Site Policy Awareness
Polyalphabetic
Multi-Processing
Hub
45. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Forensic Copy
Encryption
Central Processing Unit (CPU)
Change Control
46. Those who initiate the attack
Digital Signature
Threat Agent
Tapping
ff Site
47. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Cache
Dictionary Attack
Reciprocal Agreement
Fire Classes
48. OOP concept of an object at runtime
On-Site
Instance
Rogue Access Points
Supervisor Mode (monitor - system - privileged)
49. A secure connection to another network.
Gateway
Emergency Procedures
Process Isolation
Interpreter
50. Record of system activity - which provides for monitoring and detection.
Asymmetric
False Negative
Log
ISO/IEC 27002