SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Smurf
Simulation Test
Relocation
Admissible
2. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Covert Channel
Near Site
Orange Book A Classification
Firewall
3. System directed mediation of access with labels
5 Rules Of Evidence
Alert
Wireless Fidelity (Wi-Fi )
Mandatory
4. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Conflict Of Interest
Pervasive Computing and Mobile Computing Devices
Sniffing
Critical Functions
5. Final purpose or result
Payload
Disaster Recovery Teams (Business Recovery Teams)
Man-In-The-Middle Attack
Access Control Matrix
6. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Blackout
Threats
Key Management
7. Code making
Information Flow Model
Tort
Cryptography
Mobile Recovery
8. Malware that makes small random changes to many data points
Executive Succession
Data Diddler
Noise
Business Impact Analysis
9. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Restoration
User Mode (problem or program state)
Security Clearance
Cryptology
10. A disturbance that degrades performance of electronic devices and electronic communications.
Radio Frequency Interference (RFI)
Injection
Monitor
CPU Cache
11. Induces a crime - tricks a person - and is illegal
TCSEC (Orange Book)
Entrapment
Record Level Deletion
Education
12. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Complete
ff Site
Custodian
Non-Discretionary Access Control
13. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Brownout
Lattice
Architecture
Deleted File
14. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Access Control Attacks
Alert/Alarm
Tar Pits
Exercise
15. Hardware or software that is part of a larger system
Blackout
Operational
Embedded
Qualitative
16. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Privacy Laws
Alternate Data Streams (File System Forks)
Key Clustering
ITSEC
17. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Hacker
Layering
Threats
Forward Recovery
18. Maintenance procedures outline the process for the review and update of business continuity plans.
Plan Maintenance Procedures
Man-In-The-Middle Attack
Business Impact Assessment (BIA)
Risk Assessment
19. Wrong against society
Eavesdropping
Proprietary
Mandatory
Criminal Law
20. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Emergency Procedures
Plaintext
Information Flow Model
Mandatory Vacations
21. Momentary loss of power
Policy
Data Dictionary
Fault
Cross Training
22. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Multilevel Security System
Alarm Filtering
Business Continuity Program
Custodian
23. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Site Policy
Full Test (Full Interruption)
Cross-Site Scripting
Digital Signature
24. More than one CPU on a single board
Proxies
Data Integrity
Multi-Core
Object
25. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Chain Of Custody
Injection
Packet Filtering
Site Policy Awareness
26. Consume resources to a point of exhaustion - loss of availability
Switches
Failure Modes and Effect Analysis (FEMA)
Denial Of Service
Labeling
27. Two different keys decrypt the same cipher text
Confidence Value
Key Clustering
Orange Book C2 Classification
Recovery
28. Alerts personnel to the presence of a fire
Crisis
Data Leakage
Triage
Fire Detection
29. DoS - Spoofing - dictionary - brute force - wardialing
Complete
Access Control Attacks
Territoriality
Checksum
30. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Message Digest
Redundant Servers
Distributed Denial Of Service
Mandatory Vacations
31. Record history of incident
Tracking
Private Branch Exchange (PBX)
Full Test (Full Interruption)
Quantitative
32. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Machine Language (Machine Code)
Redundant Servers
Access Control Lists
Data Backup Strategies
33. Converts a high level language into machine language
Vulnerability
Assembler
Algorithm
Damage Assessment
34. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Mandatory Access Control (MAC)
Stopped
Mantrap (Double Door System)
Business Recovery Team
35. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Encapsulation
Open Mail Relay Servers
Remote Access Trojan
Noise
36. Interception of a communication session by an attacker.
Targeted Testing
SYN Flooding
Reciprocal Agreement
Hijacking
37. A race condition where the security changes during the object's access
Orange Book D Classification
Fire Detection
Cryptanalysis
Time Of Check/Time Of Use
38. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Sequence Attacks
Detective
Encryption
Event
39. Recovery alternative - everything needed for the business function - except people and last backup
Hot Site
Orange Book B1 Classification
Man-In-The-Middle Attack
Highly Confidential
40. For PKI - to store another copy of a key
Copyright
Maximum Tolerable Downtime (MTD)
Radio Frequency Interference (RFI)
Key Escrow
41. A telephone exchange for a specific office or business.
Private Branch Exchange (PBX)
Notification
Admissible
Cryptography
42. Control category - more than one control on a single asset
Fault Tolerance
Non-Repudiation
Compensating
Kernel
43. A distributed system's transaction control that requires updates to complete or rollback
Orange Book A Classification
2-Phase Commit
IP Address Spoofing
Trade Secret
44. A world-wide wireless technology
Directive
Kernel
Wireless Fidelity (Wi-Fi )
Assembler
45. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
The ACID Test
Criminal Law
System Life Cycle
Data Backup Strategies
46. To collect many small pieces of data
Incident Response Team
Aggregation
Recovery Strategy
Stopped
47. Object based description of a system or a collection of resources
Recovery Strategy
Access Control Matrix
Man-In-The-Middle Attack
Control
48. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Firewalls
Threads
Test Plan
Operational Impact Analysis
49. One of the key benefits of a network is the ability to share files stored on the server among several users.
Critical Infrastructure
Checkpoint
Safeguard
File Sharing
50. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Critical Infrastructure
Log
Digital Certificate
Failure Modes and Effect Analysis (FEMA)