SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Salami
Test Plan
Highly Confidential
Access Control Lists
2. Uncheck data input which results in redirection
User
HTTP Response Splitting
Data Integrity
Cryptovariable
3. Natural or human-readable form of message
TEMPEST
Electrostatic Discharge
Plain Text
Journaling
4. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Modems
Crisis
Site Policy Awareness
Risk Assessment
5. Malware that makes small random changes to many data points
Data Diddler
Preemptive
IDS Intrusion Detection System
Cache
6. A device that converts between digital and analog representation of data.
Modems
Multi-Core
Plain Text
Coaxial Cable
7. Unused storage capacity
Slack Space
Embedded Systems
Initialization Vector
Need-To-Know
8. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Relocation
Electromagnetic Interference (EMI)
Teardrop
The ACID Test
9. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Sharing
Degauss
Double Blind Testing
Recovery
10. A programming design concept which abstracts one set of functions from another in a serialized fashion
Layering
Malformed Input
Policy
Data Hiding
11. A electronic attestation of identity by a certificate authority
Confidence Value
Digital Certificate
Business Impact Assessment (BIA)
The ACID Test
12. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Site Policy
Security Clearance
Shift Cipher (Caesar)
Common Law
13. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Alarm Filtering
Codec
Job Training
Enticement
14. Control category- to discourage an adversary from attempting to access
Slack Space
Deterrent
Object
Plain Text
15. A back up type - where the organization has excess capacity in another location.
Business Interruption
Basics Of Secure Design
Distributed Processing
Technical Access Controls
16. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Parallel Test
Smurf
Simulation
Codec
17. What is will remain - persistence
Durability
Mirrored Site
Denial Of Service
Consistency
18. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Internal Use Only
File Server
Worldwide Interoperability for Microwave Access (WI-MAX )
Top Secret
19. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
CPU Cache
Interception
Plain Text
System Life Cycle
20. Those who initiate the attack
Kernel
Threat Agent
Convincing
Framework
21. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Logic Bomb
Cipher Text
ITSEC
Public Key Infrastructure (PKI)
22. Responsibility of a user for the actions taken by their account which requires unique identification
Bit
The ACID Test
Accountability
Parallel Test
23. Summary of a communication for the purpose of integrity
Locard's Principle
Message Digest
Mirroring
Plaintext
24. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Business Interruption
Framework
Digital Signature
Emergency
25. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Ring Protection
Administrative Laws
Hacker
Guidelines
26. A device that provides the functions of both a bridge and a router.
Data Leakage
Brouter
Business Recovery Timeline
Business Continuity Planning (BCP)
27. A group or network of honeypots
Highly Confidential
Honeynet
Mirroring
Honeypot
28. An event which stops business from continuing.
Polymorphism
Business Continuity Program
Disaster
Inheritance
29. The technical and risk assesment of a system within the context of the operating environment
Database Shadowing
Cipher Text
Recovery Strategy
Certification
30. To load the first piece of software that starts a computer.
Boot (V.)
Containment
Authentic
Tort
31. Control category- to give instructions or inform
Isolation
Directive
Logic Bomb
Access Control Matrix
32. Planning with a goal of returning to the normal business function
Hub
Emergency Procedures
Wireless Fidelity (Wi-Fi )
Restoration
33. Quantity of risk remaining after a control is applied
Discretionary
Residual Risk
Guidelines
Warm Site
34. High degree of visual control
Accreditation
Mantrap (Double Door System)
Surveillance
Encapsulation
35. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Operating
Remanence
Business Continuity Program
Brownout
36. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Backup
Supervisor Mode (monitor - system - privileged)
Call Tree
Multi-Tasking
37. Pertaining to law - accepted by a court
Admissible
Trademark
Surge Suppressor
TNI (Red Book)
38. More than one process in the middle of executing at a time
Security Blueprint
Multi-Tasking
Mobile Recovery
Byte Level Deletion
39. Unsolicited advertising software
Adware
Memory Management
Risk Assessment / Analysis
Hot Spares
40. A layer 2 device that used to connect two or more network segments and regulate traffic.
False Negative
Archival Data
Disaster Recovery Plan
Switches
41. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Voice Over IP (VOIP)
Data Marts
Proxies
Debriefing/Feedback
42. Maximum tolerance for loss of certain business function - basis of strategy
Recovery Time Objectives
Mantrap (Double Door System)
Data Backup Strategies
Integrated Test
43. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Gateway
Multilevel Security System
Byte Level Deletion
CPU Cache
44. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Switches
Emergency Operations Center (EOC)
Full Test (Full Interruption)
Plaintext
45. Pertaining to law - no omissions
Embedded Systems
Complete
Business Continuity Program
Total Risk
46. False memory reference
Key Space
Dangling Pointer
5 Rules Of Evidence
Durability
47. To set the clearance of a subject or the classification of an object
Labeling
Permutation /Transposition
Notification
Change Control
48. Objects or programming that looks the different but act same
Distributed Processing
Key Management
Smurf
Polymorphism
49. To evaluate the current situation and make basic decisions as to what to do
Protection
Triage
Proxies
Patch Panels
50. Weak evidence
Vital Record
Hearsay
Isolation
Multi-Core
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests