SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An availability attack - to consume resources to the point of exhaustion
Mandatory
Denial Of Service
Polyalphabetic
Orange Book A Classification
2. A computer designed for the purpose of studying adversaries
Accountability
Analysis
Honeypot
Administrative Access Controls
3. Fault tolerance for power
Chain of Custody
Admissible
Generator
Orange Book A Classification
4. The managerial approval to operate a system based upon knowledge of risk to operate
One Time Pad
Accreditation
Active Data
Alarm Filtering
5. Collection of data on business functions which determines the strategy of resiliency
Decipher
Business Recovery Timeline
E-Mail Spoofing
Business Impact Assessment (BIA)
6. System directed mediation of access with labels
Mandatory
Data Warehouse
True Attack Stimulus
Covert Channel
7. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Strong Authentication
Encryption
Database Shadowing
Deleted File
8. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Cryptovariable
Site Policy Awareness
CPU Cache
Mandatory Access Control (MAC)
9. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Secondary Storage
Access Control Lists
Isolation
Service Bureau
10. High level - pertaining to planning
False Negative
MOM
Attacker (Black hat - Hacker)
Strategic
11. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Concentrator
Access Control Lists
Surge
3 Types of harm Addressed in computer crime laws
12. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Residual Risk
Voice Over IP (VOIP)
Ethics
Job Rotation
13. Uncleared buffers or media
Sniffing
Business Records
Object Reuse
Archival Data
14. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Multi-Programming
Decipher
Degauss
Qualitative
15. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Data Owner
Marking
Adware
5 Rules Of Evidence
16. Memory management technique which allows data to be moved from one memory address to another
Recovery Strategy
Relocation
Total Risk
Bit
17. To smooth out reductions or increases in power
Burn
Voice Over IP (VOIP)
UPS
Digital Signature
18. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Executive Succession
Kerckhoff's Principle
Incident Manager
Data Dictionary
19. Guidelines within an organization that control the rules and configurations of an IDS
Confidence Value
Double Blind Testing
Site Policy
CPU Cache
20. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
IDS Intrusion Detection System
File Extension
Electronic Vaulting
Exercise
21. Using small special tools all tumblers of the lock are aligned - opening the door
Routers
Redundant Array Of Independent Drives (RAID)
Picking
Critical Functions
22. One way encryption
Trademark
EMI
Hash Function
Entrapment
23. System of law based upon what is good for society
Domain
Data Owner
Civil Or Code Law
Mobile Site
24. Employment education done once per position or at significant change of function
Countermeasure
Operational Exercise
Exposure
Job Training
25. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Revocation
Degauss
CPU Cache
Replication
26. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Recovery Period
The ACID Test
Mirroring
Full-Interruption test
27. Define the way in which the organization operates.
Concatenation
Entrapment
User
Proprietary
28. Initial surge of current
Wireless Fidelity (Wi-Fi )
User Mode (problem or program state)
Confidence Value
Inrush Current
29. To collect many small pieces of data
Machine Language (Machine Code)
Aggregation
Metadata
Compartmentalize
30. Data or interference that can trigger a false positive
Cryptography
Noise
Class
Inheritance
31. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. With enough computing power trying all possible combinations
Brute Force
Payload
Investigation
Digital Signature
33. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Distributed Denial Of Service
Infrastructure
Threads
Multilevel Security System
34. Controls for termination of attempt to access object
Chain of Custody
Key Management
Intrusion Prevention Systems
SYN Flooding
35. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Transfer
Incident
Common Law
Checklist Test (desk check)
36. Mathematical function that determines the cryptographic operations
Algorithm
Declaration
Data Marts
Job Rotation
37. Moving the alphabet intact a certain number spaces
Packet Filtering
Maximum Tolerable Downtime (MTD)
Disaster Recovery Teams (Business Recovery Teams)
Shift Cipher (Caesar)
38. Autonomous malware that requires a flaw in a service
Quantitative Risk Analysis
Worm
Encryption
Due Diligence
39. Malware that makes many small changes over time to a single data point or system
Salami
Service Bureau
Hacker
Mobile Recovery
40. The partial or full duplication of data from a source database to one or more destination databases.
Authorization
Database Replication
Log
Dictionary Attack
41. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Directive
Mirroring
ISO/IEC 27002
Declaration
42. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Exposure
Checklist Test
On-Site
Birthday Attack
43. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Basics Of Secure Design
False Attack Stimulus
Physical Tampering
Change Control
44. The study of cryptography and cryptanalysis
Surveillance
Ring Protection
Restoration
Cryptology
45. Interception of a communication session by an attacker.
Brute Force
Hijacking
Orange Book C2 Classification
Metadata
46. Mediation of subject and object interactions
Policy
Metadata
Deadlock
Access Control
47. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Exposure
Overlapping Fragment Attack
Containment
Public Key Infrastructure (PKI)
48. Use of specialized techniques for recovery - authentication - and analysis of electronic data
File Shadowing
Plan Maintenance Procedures
Threads
Computer Forensics
49. A database backup type which records at the transaction level
Trojan Horse
Remote Journaling
Threats
Shadowing (file shadowing)
50. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Radio Frequency Interference (RFI)
Investigation
Monitor
Confidence Value