SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol for the efficient transmission of voice over the Internet
Voice Over IP (VOIP)
Analysis
Overlapping Fragment Attack
Inrush Current
2. A back up type - where the organization has excess capacity in another location.
Deletion
Least Privilege
Aggregation
Distributed Processing
3. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Residual Data
Emanations
EMI
ITSEC
4. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
High-Risk Areas
Multi-Core
Critical Functions
Guidelines
5. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
3 Types of harm Addressed in computer crime laws
BCP Testing Drills and Exercises
Multi-Processor
Discretionary Access Control (DAC)
6. A physical enclosure for verifying identity before entry to a facility
Mantrap (Double Door System)
Picking
State Machine Model
Warm Site
7. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
War Dialing
Restoration
Deterrent
Incident Response Team
8. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Examples of technical security components
Durability
Data Backup Strategies
Failure Modes and Effect Analysis (FEMA)
9. Consume resources to a point of exhaustion - loss of availability
Hub
Emergency Operations Center (EOC)
Denial Of Service
Surge
10. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Business Continuity Program
Denial Of Service
DR Or BC Coordinator
Residual Data
11. Tool which mediates access
IP Fragmentation
Control
Storage Area Network (SAN)
Critical Functions
12. Power surge
Transients
Electrostatic Discharge
Classification
One Time Pad
13. Inappropriate data
Cipher Text
Incident Response
Malformed Input
Binary
14. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Checksum
Common Law
Residual Risk
CobiT
15. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Trojan Horse
Modems
Executive Succession
File Extension
16. Process whereby data is removed from active files and other data storage structures
Inference
Worm
Deletion
Aggregation
17. Program that inappropriately collects private data or activity
Cache
Spyware
Digital Signature
Remote Journaling
18. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Disaster Recovery Tape
Wireless Fidelity (Wi-Fi )
Information Owner
Work Factor
19. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
The ACID Test
Archival Data
Incident Response Team
Redundant Array Of Independent Drives (RAID)
20. To execute more than one instruction at an instant in time
Cryptography
Tactical
Computer Forensics
Multi-Processing
21. Intellectual property protection for an invention
Patent
ITSEC
Contact List
Embedded
22. A telephone exchange for a specific office or business.
Trojan Horse
Private Branch Exchange (PBX)
Metadata
Exercise
23. One entity with two competing allegiances
Conflict Of Interest
Patent
Monitor
Isolation
24. A condition in which neither party is willing to stop their activity for the other to complete
Deadlock
Education
HTTP Response Splitting
Plaintext
25. A group or network of honeypots
Parallel Test
Cryptology
Honeynet
Executive Succession
26. Using many alphabets
Territoriality
Polyalphabetic
Durability
Disaster Recovery Tape
27. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Data Dictionary
Incident Response Team
Business Recovery Timeline
System Life Cycle
28. Planning with a goal of returning to the normal business function
Disaster Recovery Plan
Operating
Algorithm
Restoration
29. Requirement of access to data for a clearly defined purpose
Archival Data
Examples of technical security components
Need-To-Know
Interference (Noise)
30. Indivisible - data field must contain only one value that either all transactions take place or none do
Atomicity
Cache
Ethics
Business Recovery Team
31. Pertaining to law - high degree of veracity
Slack Space
Accurate
Structured Walkthrough
Alert
32. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Common Law
Non-Discretionary Access Control
Concentrator
Architecture
33. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Information Risk Management (IRM)
Hot Site
Chain of Custody
Public Key Infrastructure (PKI)
34. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Business Records
Routers
Exercise
Life Cycle of Evidence
35. Memory management technique which allows subjects to use the same resource
Authentication
Mirrored Site
Fire Detection
Sharing
36. For PKI - to store another copy of a key
Test Plan
Electromagnetic Interference (EMI)
Key Escrow
Fire Detection
37. Descrambling the encrypted message with the corresponding key
Fraggle
Codec
Capability Tables
Decipher
38. To jump to a conclusion
Simulation
Inference
Structured Walkthrough
Locard's Principle
39. Memory - RAM
Steganography
Primary Storage
Full Test (Full Interruption)
Discretionary
40. Property that data is represented in the same manner at all times
Patch Management
Executive Succession
Consistency
Data Custodian
41. The hard drive
Secondary Storage
Sniffing
Polymorphism
Adware
42. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Sequence Attacks
Disaster Recovery Plan
Embedded Systems
Hijacking
43. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Open Mail Relay Servers
Authentic
Classification Scheme
Hot Spares
44. Controls for termination of attempt to access object
Side Channel Attack
Residual Risk
Deletion
Intrusion Prevention Systems
45. The connection between a wireless and wired network.
Bumping
Access Point
E-Mail Spoofing
Control Type
46. People who interact with assets
Routers
Accountability
User
Detection
47. A documented battle plan for coordinating response to incidents.
Orange Book A Classification
Control Type
Incident Handling
Mock Disaster
48. Policy or stated actions
Due Care
Acronym for American Standard Code for Information Interchange (ASCII)
Separation Of Duties
Trojan Horse
49. Mediation of covert channels must be addressed
Information Flow Model
Routers
Declaration
Test Plan
50. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Basics Of Secure Design
Containment
Disk Mirroring
Qualitative