SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Detective
Mission-Critical Application
False (False Positive)
Declaration
2. An unintended communication path
BCP Testing Drills and Exercises
Fraggle
Covert Channel
Criminal Law
3. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Hot Spares
Redundant Array Of Independent Drives (RAID)
Metadata
Mandatory
4. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Running
Conflict Of Interest
Critical Infrastructure
Detective
5. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Disaster
Class
Data Hiding
Civil Law
6. Forgery of the sender's email address in an email header.
Machine Language (Machine Code)
E-Mail Spoofing
Smurf
Uninterruptible Power Supply (UPS)
7. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Emanations
Residual Risk
Security Clearance
Business Recovery Timeline
8. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Open Mail Relay Servers
Shadowing (file shadowing)
Forensic Copy
Class
9. Memory management technique which allows data to be moved from one memory address to another
Access Control
Man-In-The-Middle Attack
Relocation
Virtual Memory
10. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Alternate Data Streams (File System Forks)
Administrative Law
Common Criteria
Territoriality
11. To assert or claim credentialing to an authentication system
Confidence Value
Threads
Identification
Waterfall
12. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Notification
Electronic Vaulting
Common Law
Prevention
13. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Memory Management
Orange Book C Classification
Computer Forensics
Call Tree
14. Less granular organization of controls -
Near Site
Authorization
Control Type
Criminal Law
15. Total number of keys available that may be selected by the user of a cryptosystem
Data Custodian
Call Tree
Hard Disk
Key Space
16. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Threats
Data Leakage
Administrative Law
Redundant Servers
17. A layer 2 device that used to connect two network segments and regulate traffic.
Alternate Data Streams (File System Forks)
Bridge
IP Fragmentation
Identification
18. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Recovery
Open Mail Relay Servers
Distributed Processing
Business Interruption
19. A Trojan horse with the express underlying purpose of controlling host from a distance
Hearsay Evidence
Remote Access Trojan
Salami
Time Of Check/Time Of Use
20. A state where two subjects can access the same object without proper mediation
Governance
Debriefing/Feedback
Race Condition
Legacy Data
21. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Checksum
Data Leakage
Surge
Checklist Test
22. Communicate to stakeholders
Activation
Risk
Business Continuity Planning (BCP)
Debriefing/Feedback
23. An asymmetric cryptography mechanism that provides authentication.
Security Blueprint
Dictionary Attack
Digital Signature
Bridge
24. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Emergency Operations Center (EOC)
Technical Access Controls
Non-Repudiation
Ring Protection
25. A device that provides the functions of both a bridge and a router.
Emergency Procedures
Rollback
Business Recovery Timeline
Brouter
26. OOP concept of an object at runtime
Instance
Byte
Remote Journaling
Crisis
27. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Elements of Negligence
Basics Of Secure Design
Integrated Test
Cryptovariable
28. Mediation of subject and object interactions
Aggregation
Access Control
Accurate
False Attack Stimulus
29. Record of system activity - which provides for monitoring and detection.
Log
Integrated Test
False Negative
Multi-Tasking
30. Hardware or software that is part of a larger system
2-Phase Commit
Encapsulation
Embedded
Workaround Procedures
31. An administrative unit or a group of objects and subjects controlled by one reference monitor
Business Interruption Insurance
Sniffing
Trusted Computing Base
Security Domain
32. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Switches
Burn
Total Risk
Incident Response Team
33. People protect their domain
Territoriality
Fault
Directive
Revocation
34. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Structured Walkthrough
Mobile Recovery
BCP Testing Drills and Exercises
Evidence
35. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Orange Book B2 Classification
Mobile Recovery
Steganography
Information Owner
36. Eavesdropping on network communications by a third party.
Digital Signature
Compiler
UPS
Tapping
37. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Active Data
CobiT
Content Dependent Access Control
Identification
38. To set the clearance of a subject or the classification of an object
Class
Certification
Labeling
Access Control Lists
39. Information about data or records
Hub
Metadata
Bollard
Risk Mitigation
40. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Degauss
Teardrop
Change Control
Checksum
41. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
ISO/IEC 27002
Discretionary Access Control (DAC)
Kernel
Data Backup Strategies
42. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Safeguard
Administrative Laws
Routers
Man-In-The-Middle Attack
43. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Emergency Operations Center (EOC)
Data Backups
Public Key Infrastructure (PKI)
Satellite
44. Unsolicited commercial email
Cross Certification
Spam
Satellite
Discretionary Access Control (DAC)
45. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
ISO/IEC 27001
Orange Book A Classification
File Server
Content Dependent Access Control
46. Using small special tools all tumblers of the lock are aligned - opening the door
JPEG (Joint Photographic Experts Group)
Computer System Evidence
Picking
Job Training
47. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Hijacking
Embedded Systems
Encapsulation
Fire Classes
48. A back up type - where the organization has excess capacity in another location.
Procedure
Distributed Processing
Coaxial Cable
Encryption
49. A description of a database
Cipher Text
Data Dictionary
True Attack Stimulus
Corrective
50. Intellectual property protection for marketing efforts
Trademark
False Negative
Top Secret
Site Policy
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests