SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mitigate damage by isolating compromised systems from the network.
Process Isolation
Containment
Mirroring
Wireless Fidelity (Wi-Fi )
2. To assert or claim credentialing to an authentication system
Identification
Admissible
Mandatory Access Control (MAC)
CobiT
3. Periodic - automatic and transparent backup of data in bulk.
Stopped
Supervisor Mode (monitor - system - privileged)
User Mode (problem or program state)
Electronic Vaulting
4. OOP concept of an object at runtime
Instance
Distributed Processing
Bumping
Deadlock
5. The first rating that requires security labels
Centralized Access Control Technologies
Orange Book B1 Classification
High-Risk Areas
Separation Of Duties
6. To evaluate the current situation and make basic decisions as to what to do
Message Digest
Key Management
Triage
Spyware
7. To smooth out reductions or increases in power
Safeguard
UPS
Honeypot
Embedded Systems
8. High level - pertaining to planning
Strategic
State Machine Model
Business Continuity Steering Committee
Trusted Computing Base
9. The technical and risk assesment of a system within the context of the operating environment
Architecture
Certification
Critical Infrastructure
Brownout
10. A type of multitasking that allows for more even distribution of computing time among competing request
Top Secret
Coaxial Cable
Administrative Access Controls
Preemptive
11. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Concentrator
Collisions
Fault Tolerance
Algorithm
12. Intellectual property protection for an confidential and critical process
JPEG (Joint Photographic Experts Group)
Trade Secret
Routers
Information Risk Management (IRM)
13. A covert storage channel on the file attribute
Cross-Site Scripting
UPS
Alternate Data Streams (File System Forks)
War Driving
14. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Redundant Array Of Independent Drives (RAID)
Fire Classes
Isolation
Source Routing Exploitation
15. Process of statistically testing a data set for the likelihood of relevant information.
Sampling
Physical Tampering
Residual Risk
Consistency
16. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Encryption
Job Rotation
Encipher
Common Criteria
17. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Voice Over IP (VOIP)
High-Risk Areas
Teardrop
Civil Law
18. A backup type - for databases at a point in time
Executive Succession
Shadowing (file shadowing)
Brute Force
Alert/Alarm
19. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. OOP concept of a distinct copy of the class
Forensic Copy
Object
Identification
Administrative Law
21. Requirement of access to data for a clearly defined purpose
Call Tree
Need-To-Know
Operating
Symmetric
22. Firewalls - encryption - and access control lists
Access Control Matrix
Workaround Procedures
Examples of technical security components
Incident Response
23. Identification and notification of an unauthorized and/or undesired action
Detection
Data Backups
Multi-Tasking
Database Replication
24. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Total Risk
Public Key Infrastructure (PKI)
Privacy Laws
Rootkit
25. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Emergency
Spam
Open Mail Relay Servers
Chain Of Custody
26. A device that converts between digital and analog representation of data.
Structured Walkthrough
Modems
Business Interruption
Contact List
27. A distributed system's transaction control that requires updates to complete or rollback
Custodian
2-Phase Commit
Chain Of Custody
Encapsulation
28. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Interception
Access Control Attacks
Directive
Steganography
29. A running key using a random key that is never used again
Fire Classes
Network Attached Storage (NAS)
One Time Pad
Central Processing Unit (CPU)
30. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Simulation
Contact List
Due Care
Permutation /Transposition
31. Pertaining to law - lending it self to one side of an argument
Convincing
Mirrored Site
Attacker (Black hat - Hacker)
Hearsay Evidence
32. Encryption system using shared key/private key/single key/secret key
Shift Cipher (Caesar)
Spiral
Least Privilege
Symmetric
33. A signal suggesting a system has been or is being attacked.
Common Law
Worm
Alert/Alarm
File
34. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Gateway
Technical Access Controls
Plan Maintenance Procedures
Conflict Of Interest
35. OOP concept of a template that consist of attributes and behaviors
Class
Classification
Satellite
IP Address Spoofing
36. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Worm
Initialization Vector
Spam
Proxies
37. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Checksum
Phishing
Activation
Business Continuity Planning (BCP)
38. Written internalized or nationalized norms that are internal to an organization
Standard
Logic Bomb
Hash Function
Surge Suppressor
39. A trusted issuer of digital certificates
One Time Pad
Slack Space
Central Processing Unit (CPU)
Certification Authority
40. To load the first piece of software that starts a computer.
Strong Authentication
System Life Cycle
Containment
Boot (V.)
41. State of computer - to be running a process
Routers
Packet Filtering
Operating
Education
42. With enough computing power trying all possible combinations
Deletion
Key Escrow
Alert/Alarm
Brute Force
43. Record of system activity - which provides for monitoring and detection.
Log
Inrush Current
Criminal Law
Encipher
44. A design methodology which addresses risk early and often
Virus
Spiral
Shadowing (file shadowing)
Bumping
45. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Integrated Test
Compiler
Asymmetric
Processes are Isolated By
46. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Plan Maintenance Procedures
Redundant Array Of Independent Drives (RAID)
Protection
Patch Management
47. Renders the file inaccessible to the operating system - available to reuse for data storage.
Radio Frequency Interference (RFI)
Admissible
File Level Deletion
Civil Or Code Law
48. Eavesdropping on network communications by a third party.
Fragmented Data
Domain
Tapping
ISO/IEC 27002
49. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Content Dependent Access Control
Time Of Check/Time Of Use
Boot (V.)
Recovery Period
50. One way encryption
Blackout
Patch Panels
Accreditation
Hash Function
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests