SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A passive network attack involving monitoring of traffic.
Eavesdropping
Near Site
Durability
Corrective
2. A software design technique for abstraction of a process
Encipher
Data Hiding
Business Recovery Timeline
Picking
3. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Rogue Access Points
Mitigate
Masked/Interruptible
Technical Access Controls
4. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Walk Though
Hearsay
Acronym for American Standard Code for Information Interchange (ASCII)
Job Rotation
5. System mediation of access with the focus on the context of the request
Content Dependent Access Control
Mitigate
Risk
Birthday Attack
6. Return to a normal state
Checklist Test
Wait
Recovery
Multilevel Security System
7. A distributed system's transaction control that requires updates to complete or rollback
2-Phase Commit
Code
TIFF (Tagged Image File Format)
Change Control
8. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
Interpreter
Structured Walk-Through Test
TEMPEST
Tar Pits
9. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Surge
Governance
Due Diligence
Distributed Denial Of Service
10. Consume resources to a point of exhaustion - loss of availability
Administrative Access Controls
Multi-Party Control
Denial Of Service
Wait
11. Lower frequency noise
Radio Frequency Interference (RFI)
Orange Book B1 Classification
Routers
Structured Walkthrough
12. A layer 2 device that used to connect two network segments and regulate traffic.
Bridge
Digital Signature
Full-Interruption test
Concatenation
13. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Revocation
Cryptanalysis
Cross Certification
Multi-Programming
14. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
Orange Book B2 Classification
One Time Pad
TNI (Red Book)
Aggregation
15. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Hot Site
Parallel Test
Application Programming Interface
Risk Assessment / Analysis
16. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Elements of Negligence
Substitution
Residual Risk
Safeguard
17. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Cryptography
Bit
IP Fragmentation
Uninterruptible Power Supply (UPS)
18. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
Detection
Remote Journaling
IP Address Spoofing
TIFF (Tagged Image File Format)
19. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Risk Assessment / Analysis
Patent
Alternate Site
Hot Spares
20. An availability attack - to consume resources to the point of exhaustion
Security Domain
Shielding
Denial Of Service
Internal Use Only
21. Unsolicited commercial email
Key Space
Spam
Identification
Investigation
22. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Encapsulation
Worm
Disaster Recovery Tape
Least Privilege
23. A system that enforces an access control policy between two networks.
Firewalls
Examples of non-technical security components
Protection
Mandatory Vacations
24. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Locard's Principle
TEMPEST
Orange Book C Classification
Reference Monitor
25. An event which stops business from continuing.
Disaster
Locard's Principle
Architecture
Fire Detection
26. Renders the file inaccessible to the operating system - available to reuse for data storage.
Investigation
Parallel Test
Secondary Storage
File Level Deletion
27. A control after attack
Alarm Filtering
Countermeasure
Encryption
Remote Journaling
28. Low level - pertaining to planning
Security Blueprint
Tactical
Checklist Test (desk check)
Conflict Of Interest
29. Those who initiate the attack
True Attack Stimulus
Mock Disaster
Metadata
Threat Agent
30. State of computer - to be running a process
Operating
Compiler
Structured Walk-Through Test
Risk Assessment / Analysis
31. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Redundant Servers
Bit
Electrostatic Discharge
Metadata
32. Periodic - automatic and transparent backup of data in bulk.
Electronic Vaulting
Compression
Ring Protection
Remote Access Trojan
33. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Worldwide Interoperability for Microwave Access (WI-MAX )
Multi-Programming
Encapsulation
Mantrap (Double Door System)
34. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Remote Journaling
Redundant Servers
2-Phase Commit
Multi-Processor
35. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Procedure
Full Test (Full Interruption)
Kerberos
Threats
36. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Administrative Laws
Strong Authentication
Rollback
Byte Level Deletion
37. High level - pertaining to planning
Firmware
Isolation
Strategic
Targeted Testing
38. A race condition where the security changes during the object's access
Emergency Operations Center (EOC)
Time Of Check/Time Of Use
Containment
Object Oriented Programming (OOP)
39. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Recovery Strategy
Interference (Noise)
Classification Scheme
Contingency Plan
40. Mathematical function that determines the cryptographic operations
Checkpoint
Attacker (Black hat - Hacker)
Algorithm
Mobile Site
41. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Radio Frequency Interference (RFI)
Key Clustering
Fragmented Data
Analysis
42. Object reuse protection and auditing
Malformed Input
Teardrop
Spiral
Orange Book C2 Classification
43. Using small special tools all tumblers of the lock are aligned - opening the door
Virus
Centralized Access Control Technologies
Picking
Education
44. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
Hearsay Evidence
Active Data
Structured Walk-Through Test
SQL Injection
45. A technology that reduces the size of a file.
Key Clustering
Authentication
Monitor
Compression
46. With enough computing power trying all possible combinations
Collisions
Brute Force
Internal Use Only
Hash Function
47. Event(s) that cause harm
Incident
ITSEC
Fault
Control Type
48. To execute more than one instruction at an instant in time
IDS Intrusion Detection System
Multi-Processing
Denial Of Service
Digital Certificate
49. Object based description of a system or a collection of resources
Alarm Filtering
Business Unit Recovery
Access Control Matrix
Detective
50. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Domain
Business Continuity Steering Committee
Incident Manager
Active Data