SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The guardian of asset(s) - a maintenance activity
Guidelines
Total Risk
Custodian
Data Owner
2. Define the way in which the organization operates.
Due Care
Proprietary
Source Routing Exploitation
Switches
3. Real-time data backup ( Data Mirroring)
File Shadowing
Simulation
Database Shadowing
True Attack Stimulus
4. Try a list of words in passwords or encryption keys
Emergency Operations Center (EOC)
Physical Tampering
Dictionary Attack
Database Shadowing
5. Object based description of a system or a collection of resources
Access Control Matrix
Network Attached Storage (NAS)
Polymorphism
Inference
6. Policy or stated actions
Civil Or Code Law
Fragmented Data
Due Care
Virtual Memory
7. An event which stops business from continuing.
File
Operational Exercise
Disaster
Separation Of Duties
8. Record history of incident
Key Escrow
CobiT
Firewalls
Tracking
9. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Coaxial Cable
Quantitative Risk Analysis
Disaster Recovery Tape
Active Data
10. Vehicle or tool that exploits a weakness
Threats
Intrusion Detection Systems
Activation
Architecture
11. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Accreditation
Race Condition
Threat Agent
Plaintext
12. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Workaround Procedures
One Time Pad
War Driving
Recovery Time Objectives
13. Control category- to give instructions or inform
Masked/Interruptible
Initialization Vector
Directive
TEMPEST
14. Just enough access to do the job
Least Privilege
Discretionary Access Control (DAC)
Initialization Vector
Confidence Value
15. A backup type which creates a complete copy
Masked/Interruptible
Kerberos
Slack Space
Replication
16. High level - pertaining to planning
Concentrator
Strategic
Certification Authority
Record Level Deletion
17. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Tar Pits
Mission-Critical Application
Certification Authority
Bumping
18. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Injection
War Driving
Business Recovery Team
Control Category
19. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
Crisis
Threats
Directive
20. The connection between a wireless and wired network.
Access Point
Data Integrity
Picking
Certification Authority
21. A programming device use in development to circumvent controls
Remote Journaling
Incident Response
Smurf
Trapdoors (Backdoors) (Maintenance Hooks)
22. Potential danger to information or systems
Malformed Input
Copyright
Non-Repudiation
Threats
23. A planned or unplanned interruption in system availability.
System Downtime
IP Address Spoofing
TEMPEST
Data Diddler
24. For PKI - to have more than one person in charge of a sensitive function
Multi-Party Control
Uninterruptible Power Supply (UPS)
Archival Data
Coaxial Cable
25. Data or interference that can trigger a false positive
Noise
Data Owner
E-Mail Spoofing
TNI (Red Book)
26. Unused storage capacity
Instance
Slack Space
Race Condition
Business Continuity Steering Committee
27. Memory management technique which allows subjects to use the same resource
Isolation
Incident Response Team
Sharing
Risk Assessment / Analysis
28. Object based description of a single resource and the permission each subject
Risk Assessment / Analysis
Access Control Lists
IP Fragmentation
Compression
29. Maintenance procedures outline the process for the review and update of business continuity plans.
Analysis
Worm
False Attack Stimulus
Plan Maintenance Procedures
30. People protect their domain
Business Recovery Timeline
Territoriality
Firmware
Business Impact Assessment (BIA)
31. Use of specialized techniques for recovery - authentication - and analysis of electronic data
User Mode (problem or program state)
Certification
Revocation
Computer Forensics
32. Impossibility of denying authenticity and identity
Policy
Forward Recovery
Non-Repudiation
Event
33. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Critical Functions
Dictionary Attack
War Driving
Access Control
34. Inappropriate data
Malformed Input
Mirrored Site
Injection
Rollback
35. Effort/time needed to overcome a protective measure
Work Factor
Redundant Array Of Independent Drives (RAID)
Multi-Party Control
Smurf
36. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Directive
Remanence
Mock Disaster
Standalone Test
37. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Contact List
Brownout
Information Risk Management (IRM)
Alternate Data Streams (File System Forks)
38. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Complete
Open Mail Relay Servers
Incident Manager
Hash Function
39. A state for operating system tasks only
Control Category
Policy
Message Digest
Supervisor Mode (monitor - system - privileged)
40. To evaluate the current situation and make basic decisions as to what to do
Voice Over IP (VOIP)
Fire Detection
Triage
Fault
41. Control category- to record an adversary's actions
Executive Succession
Data Hiding
Detective
Hijacking
42. Line by line translation from a high level language to machine code
Interpreter
IP Address Spoofing
Inheritance
Data Recovery
43. A group or network of honeypots
Honeynet
Rogue Access Points
Executive Succession
Mirrored Site
44. A collection of data or information that has a name
Maximum Tolerable Downtime (MTD)
File
Compensating
Coaxial Cable
45. A mathematical tool for verifying no unintentional changes have been made
Supervisor Mode (monitor - system - privileged)
Key Escrow
Checksum
Certificate Revocation List (CRL)
46. Pertaining to law - verified as real
Lattice
Residual Risk
Authentic
Confidence Value
47. A passive network attack involving monitoring of traffic.
Checklist Test (desk check)
Eavesdropping
Code
Attacker (Black hat - Hacker)
48. A device that provides the functions of both a bridge and a router.
Hearsay Evidence
Failure Modes and Effect Analysis (FEMA)
Threats
Brouter
49. Intellectual property protection for an confidential and critical process
Data Hiding
Hash Function
Trade Secret
Analysis
50. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Business Interruption Insurance
Archival Data
Remote Access Trojan
Mock Disaster
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests