SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Encryption system using shared key/private key/single key/secret key
Security Domain
Key Space
Symmetric
Machine Language (Machine Code)
2. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Risk
Access Control Lists
Checklist Test (desk check)
Exposure
3. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Memory Management
High-Risk Areas
Slack Space
Sampling
4. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Electronic Vaulting
Deadlock
Running
Territoriality
5. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Bollard
Sequence Attacks
Checklist Test
Internal Use Only
6. Collection of data on business functions which determines the strategy of resiliency
Forward Recovery
Business Impact Assessment (BIA)
Fault Tolerance
Civil Law
7. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Brouter
Administrative Laws
Covert Channel
Information Technology Security Evaluation Criteria - ITSEC
8. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Cookie
Checklist Test (desk check)
IP Fragmentation
Data Leakage
10. Responsibility for actions
Liability
IP Fragmentation
Byte Level Deletion
Teardrop
11. Employment education done once per position or at significant change of function
File Extension
Access Control Matrix
Remote Journaling
Job Training
12. Malware that makes many small changes over time to a single data point or system
Incident Manager
IP Fragmentation
Salami
Critical Infrastructure
13. Security policy - procedures - and compliance enforcement
Examples of non-technical security components
Ethics
Object Reuse
Orange Book C Classification
14. Memory - RAM
SYN Flooding
Primary Storage
Key Escrow
The ACID Test
15. System mediation of access with the focus on the context of the request
War Driving
Non-Discretionary Access Control
Content Dependent Access Control
Multi-Processing
16. A failure of an IDS to detect an actual attack
Administrative Law
False Negative
Code
Critical Records
17. Uses two or more legal systems
Operational Impact Analysis
Botnet
Threads
Mixed Law System
18. DoS - Spoofing - dictionary - brute force - wardialing
Twisted Pair
Access Control Attacks
Remanence
CobiT
19. A layer 2 device that used to connect two network segments and regulate traffic.
Pervasive Computing and Mobile Computing Devices
Civil Or Code Law
Code
Bridge
20. Using many alphabets
Security Kernel
Hub
Polyalphabetic
Business Recovery Team
21. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Sniffing
Trapdoors (Backdoors) (Maintenance Hooks)
Source Routing Exploitation
Brute Force
22. Outputs within a given function are the same result
Checksum
Governance
File Sharing
Collisions
23. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Electromagnetic Interference (EMI)
Recovery Strategy
Operational Impact Analysis
Business Recovery Team
24. Owner directed mediation of access
Discretionary
Certificate Revocation List (CRL)
Classification Scheme
Alternate Site
25. Indivisible - data field must contain only one value that either all transactions take place or none do
Internal Use Only
ITSEC
Atomicity
Concatenation
26. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Application Programming Interface
Liability
Alert
Business Interruption
27. Controls for logging and alerting
Intrusion Detection Systems
Access Control Lists
Classification
Activation
28. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Remote Journaling
File Extension
Overlapping Fragment Attack
Kerckhoff's Principle
29. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Alert
Threads
Time Of Check/Time Of Use
Modification
30. Those who initiate the attack
Encryption
User Mode (problem or program state)
Key Escrow
Threat Agent
31. A computer designed for the purpose of studying adversaries
Initialization Vector
Checkpoint
Machine Language (Machine Code)
Honeypot
32. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
DR Or BC Coordinator
Fraggle
Governance
Civil Law
33. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Hearsay Evidence
Incident Response Team
Least Privilege
Identification
34. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Database Shadowing
Fault Tolerance
Executive Succession
Walk Though
35. Inference about encrypted communications
ISO/IEC 27001
Side Channel Attack
Inrush Current
Lattice
36. Interception of a communication session by an attacker.
Byte Level Deletion
File Extension
Kerckhoff's Principle
Hijacking
37. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Business Records
Examples of non-technical security components
Race Condition
Threads
38. A backup of data located where staff can gain access immediately
Business Unit Recovery
Non-Repudiation
On-Site
Adware
39. People who interact with assets
Recovery
Key Clustering
User
Code
40. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Mock Disaster
Off-Site Storage
5 Rules Of Evidence
Compartmentalize
41. A layer 2 device that used to connect two or more network segments and regulate traffic.
Switches
Redundant Servers
Source Routing Exploitation
Injection
42. Line by line translation from a high level language to machine code
Multiplexers
Interpreter
Administrative
Distributed Processing
43. OOP concept of an object's abilities - what it does
Fiber Optics
Permutation /Transposition
Method
Mock Disaster
44. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Guidelines
Forensic Copy
Data Marts
Recovery Time Objectives
45. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
Man-In-The-Middle Attack
TIFF (Tagged Image File Format)
Consistency
File Extension
46. More than one CPU on a single board
Multiplexers
Orange Book C Classification
Multi-Core
Sniffing
47. Organized group of compromised computers
Chain Of Custody
Symmetric
Botnet
Physical Tampering
48. To move from location to location - keeping the same function
Mandatory
TNI (Red Book)
Policy
Job Rotation
49. A description of a database
Data Dictionary
Watermarking
Critical Functions
Architecture
50. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Residual Risk
Desk Check Test
SYN Flooding
File Level Deletion
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests