SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A form of data hiding which protects running threads of execution from using each other's memory
Notification
Detection
Process Isolation
One Time Pad
2. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Education
Keystroke Logging
One Time Pad
Structured Walk-Through Test
3. Potentially retrievable data residue that remains following intended erasure of data.
Tactical
Job Rotation
Remanence
Bumping
4. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Off-Site Storage
Disaster Recovery Tape
Hard Disk
Access Control Matrix
5. Location to perform the business function
Full-Interruption test
Alternate Site
Dangling Pointer
Public Key Infrastructure (PKI)
6. More than one CPU on a single board
Multi-Core
Surveillance
Electronic Vaulting
Job Rotation
7. Momentary loss of power
Hot Site
TIFF (Tagged Image File Format)
Top Secret
Fault
8. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Computer Forensics
Multi-Party Control
SYN Flooding
Mock Disaster
9. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Fiber Optics
Intrusion Prevention Systems
Tapping
Business Continuity Planning (BCP)
10. Dedicated fast memory located on the same board as the CPU
Business Interruption Insurance
Trusted Computing Base
CPU Cache
Transients
11. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Analysis
Disaster Recovery Plan
Patch Management
Hard Disk
12. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Disaster Recovery Plan
System Life Cycle
Decipher
Deleted File
13. One way encryption
Mandatory Access Control (MAC)
Hash Function
Business Records
Education
14. Information about a particular data set
CPU Cache
Metadata
Business Interruption Insurance
Redundant Servers
15. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Object Reuse
Operational Test
Fraggle
Dictionary Attack
16. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Sampling
Monitor
Twisted Pair
Encryption
17. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Honeynet
Highly Confidential
Incident Response
SYN Flooding
18. Weakness or flaw in an asset
Vulnerability
BCP Testing Drills and Exercises
Acronym for American Standard Code for Information Interchange (ASCII)
Non-Repudiation
19. The managerial approval to operate a system based upon knowledge of risk to operate
Accreditation
Shift Cipher (Caesar)
Control Category
Compensating
20. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Information Owner
Processes are Isolated By
Contingency Plan
Forensic Copy
21. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Collisions
Coaxial Cable
Business Continuity Program
Buffer Overflow
22. A trusted issuer of digital certificates
Journaling
CPU Cache
Certification Authority
Emergency
23. Recognition of an individual's assertion of identity.
Key Space
Identification
Access Control Attacks
Firewall
24. The collection and summation of risk data relating to a particular asset and controls for that asset
Risk Assessment
System Downtime
Data Integrity
Procedure
25. Written core statements that rarely change
Corrective
Spam
Policy
Locard's Principle
26. Of a system without prior knowledge by the tester or the tested
Incident Manager
Rollback
Double Blind Testing
Running Key
27. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Prevention
Risk Assessment / Analysis
Byte Level Deletion
Redundant Servers
28. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
3 Types of harm Addressed in computer crime laws
Structured Walkthrough
Confidence Value
Access Control Matrix
29. A program that waits for a condition or time to occur that executes an inappropriate activity
Redundant Servers
Logic Bomb
Desk Check Test
Watermarking
30. Responsibility of a user for the actions taken by their account which requires unique identification
Accountability
Embedded
Security Kernel
Civil Or Code Law
31. Trading one for another
Substitution
Interception
Mandatory
Compartmentalize
32. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Data Backups
Storage Area Network (SAN)
Fiber Optics
TIFF (Tagged Image File Format)
33. OOP concept of an object's abilities - what it does
Method
Fault Tolerance
Business Continuity Steering Committee
Data Custodian
34. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Sampling
Critical Records
Guidelines
Hub
35. The hard drive
Secondary Storage
Information Risk Management (IRM)
Threads
Compiler
36. The problems solving state - the opposite of supervisor mode
Mitigate
Site Policy
Recovery Point Objective (RPO)
User Mode (problem or program state)
37. A programming design concept which abstracts one set of functions from another in a serialized fashion
Layering
Malformed Input
Chain Of Custody
Trade Secret
38. A condition in which neither party is willing to stop their activity for the other to complete
Twisted Pair
Deadlock
Disaster Recovery Plan
Risk Assessment / Analysis
39. Mediation of covert channels must be addressed
Digital Signature
MOM
Information Flow Model
Countermeasure
40. Eavesdropping on network communications by a third party.
Sniffing
Disaster Recovery Plan
Private Branch Exchange (PBX)
Compression
41. A Denial of Service attack that floods the target system with connection requests that are not finalized.
Consistency
Sharing
SYN Flooding
Proprietary
42. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Legacy Data
Data Backup Strategies
Non-Interference
Business Recovery Team
43. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Risk
User Mode (problem or program state)
Hot Site
Critical Records
44. Memory management technique which allows data to be moved from one memory address to another
Switches
ISO/IEC 27002
Remanence
Relocation
45. Scrambled form of the message or data
Tapping
Custodian
Private Branch Exchange (PBX)
Cipher Text
46. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Patch Management
Crisis
Information Owner
Initialization Vector
47. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Mock Disaster
Failure Modes and Effect Analysis (FEMA)
Trojan Horse
Risk Assessment
48. The guardian of asset(s) - a maintenance activity
Examples of non-technical security components
Custodian
Labeling
Remote Journaling
49. Periodic - automatic and transparent backup of data in bulk.
Electronic Vaulting
Hacker
Cryptology
Primary Storage
50. One of the key benefits of a network is the ability to share files stored on the server among several users.
File Sharing
Disaster
Exercise
Remote Access Trojan