SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
Protection
Security Kernel
CobiT
TIFF (Tagged Image File Format)
2. Natural occurrence in circuits that are in close proximity
Symmetric
Modification
One Time Pad
Interference (Noise)
3. Forgery of the sender's email address in an email header.
Damage Assessment
Plain Text
E-Mail Spoofing
Sniffing
4. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Change Control
Electronic Vaulting
Business Records
Standalone Test
5. Subject based description of a system or a collection of resources
Investigation
Capability Tables
Declaration
Data Integrity
6. For PKI - to store another copy of a key
Keyed-Hashing For Message Authentication
Liability
Residual Risk
Key Escrow
7. Momentary loss of power
Architecture
Layering
Fault
Brouter
8. A database that contains the name - type - range of values - source and authorization for access for each data element
Cryptovariable
Uninterruptible Power Supply (UPS)
Job Rotation
Data Dictionary
9. Organized group of compromised computers
Overlapping Fragment Attack
State Machine Model
Botnet
Access Point
10. Calculation encompassing threats - vulnerabilities and assets
Hacker
Full-Interruption test
Spam
Total Risk
11. Physical description on the exterior of an object that communicates the existence of a label
Encapsulation
Marking
Safeguard
Alternate Data Streams (File System Forks)
12. Recovery alternative - complete duplication of services including personnel
3 Types of harm Addressed in computer crime laws
Mirrored Site
Mobile Site
Patch Panels
13. Intermediate level - pertaining to planning
Exposure
Packet Filtering
Classification Scheme
Operational
14. Malware that subverts the detective controls of an operating system
JPEG (Joint Photographic Experts Group)
Metadata
Hacker
Rootkit
15. A state for operating system tasks only
Supervisor Mode (monitor - system - privileged)
Substitution
Blackout
Operational Exercise
16. A protocol for the efficient transmission of voice over the Internet
Patent
Voice Over IP (VOIP)
Directive
Surveillance
17. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Processes are Isolated By
Cookie
Attacker (Black hat - Hacker)
Authorization
18. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Electromagnetic Interference (EMI)
Privacy Laws
DR Or BC Coordinator
Data Hiding
19. A template for the designing the architecture
Emergency Operations Center (EOC)
Security Blueprint
Access Control Lists
Exposure
20. Renders the record inaccessible to the database management system
Operating
Generator
Shielding
Record Level Deletion
21. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Phishing
Control
System Life Cycle
Labeling
22. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
One Time Pad
Keyed-Hashing For Message Authentication
Microwave
Operational Impact Analysis
23. A collection of data or information that has a name
File
Compensating
Digital Signature
Durability
24. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Proxies
Top Secret
Plaintext
Mobile Recovery
25. The first rating that requires security labels
File Extension
Recovery Strategy
Standard
Orange Book B1 Classification
26. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Revocation
Application Programming Interface
Access Control
Pointer
28. One entity with two competing allegiances
Site Policy Awareness
Bridge
ISO/IEC 27002
Conflict Of Interest
29. Try a list of words in passwords or encryption keys
Information Technology Security Evaluation Criteria - ITSEC
Identification
Dictionary Attack
Permutation /Transposition
30. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Confidence Value
Data Backups
Key Management
Masked/Interruptible
31. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Cipher Text
MOM
Distributed Processing
Multilevel Security System
32. Effort/time needed to overcome a protective measure
Directive
Logic Bomb
Work Factor
Damage Assessment
33. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Data Owner
Detective
Recovery Period
Resumption
34. To break a business process into separate functions and assign to different people
Control Category
Blackout
Modification
Separation Of Duties
35. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Business Records
Orange Book B1 Classification
Virus
HTTP Response Splitting
36. Quantity of risk remaining after a control is applied
Threat Agent
Certification
Wait
Residual Risk
37. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Byte Level Deletion
DR Or BC Coordinator
Radio Frequency Interference (RFI)
Recovery Strategy
38. Alerts personnel to the presence of a fire
Concatenation
Cipher Text
Multi-Processing
Fire Detection
39. Potentially compromising leakage of electrical or acoustical signals.
Class
Binary
Emanations
Threats
40. Forging of an IP address.
IP Address Spoofing
Key Escrow
Fiber Optics
Stopped
41. Sudden rise in voltage in the power supply.
Symmetric
Inference
Failure Modes and Effect Analysis (FEMA)
Surge
42. Object based description of a single resource and the permission each subject
Bollard
Cryptovariable
Access Control Lists
Multiplexers
43. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
True Attack Stimulus
Electromagnetic Interference (EMI)
Electronic Vaulting
Non-Interference
44. A signal suggesting a system has been or is being attacked.
Alert/Alarm
Compression
Restoration
Residual Risk
45. To execute more than one instruction at an instant in time
Side Channel Attack
Confidence Value
Data Hiding
Multi-Processing
46. The chance that something negative will occur
Total Risk
Access Control Matrix
Containment
Risk
47. Fault tolerance for power
Aggregation
Administrative Law
Generator
Malformed Input
48. Narrow scope examination of a system
Class
Incident Response
Brouter
Targeted Testing
49. The study of cryptography and cryptanalysis
Cryptology
Analysis
Hub
Cross-Site Scripting
50. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Identification
Ring Protection
Site Policy
Discretionary Access Control (DAC)