SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A electronic attestation of identity by a certificate authority
Electronic Vaulting
Digital Certificate
Deterrent
Acronym for American Standard Code for Information Interchange (ASCII)
2. A database backup type which records at the transaction level
Test Plan
Analysis
False (False Positive)
Remote Journaling
3. Control category- to discourage an adversary from attempting to access
Database Shadowing
Deterrent
Non-Discretionary Access Control
Administrative Access Controls
4. Act of scrambling the cleartext message by using a key.
Encipher
Embedded Systems
Incident Manager
Coaxial Cable
5. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Evidence
Emergency Procedures
Risk Mitigation
Basics Of Secure Design
6. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Cold Site
Algorithm
3 Types of harm Addressed in computer crime laws
Access Control
7. A device that provides the functions of both a bridge and a router.
Brouter
Hard Disk
Recovery
Moore's Law
8. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Residual Risk
Access Control Lists
Routers
Orange Book A Classification
9. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Examples of technical security components
User Mode (problem or program state)
Basics Of Secure Design
Virtual Memory
10. Memory - RAM
Cryptanalysis
Mirroring
Primary Storage
Labeling
11. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
ISO/IEC 27002
Quantitative
Business Interruption
Remanence
12. Collection of data on business functions which determines the strategy of resiliency
HTTP Response Splitting
Threat Agent
Business Impact Assessment (BIA)
Digital Signature
13. Fault tolerance for power
Object
Generator
Patch Management
Race Condition
14. Unauthorized wireless network access device.
BCP Testing Drills and Exercises
Mobile Site
Analysis
Rogue Access Points
15. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Asymmetric
Computer System Evidence
Tapping
Memory Management
16. Control type- that is communication based - typically written or oral
Embedded Systems
Administrative
Binary
Restoration
17. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Change Control
Application Programming Interface
Cross-Site Scripting
Codec
18. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
IP Fragmentation
Crisis
Kerckhoff's Principle
Business Interruption Insurance
19. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Data Backups
User Mode (problem or program state)
Twisted Pair
Territoriality
20. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Layering
Fire Classes
Distributed Denial Of Service
User
21. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
SQL Injection
Exposure
Recovery Point Objective (RPO)
Supervisor Mode (monitor - system - privileged)
22. Mediation of covert channels must be addressed
Alert/Alarm
Information Flow Model
Workaround Procedures
Recovery
23. Interception of a communication session by an attacker.
Alarm Filtering
ITSEC
Hijacking
Access Control
24. Real-time data backup ( Data Mirroring)
Tar Pits
Database Shadowing
Fragmented Data
Embedded Systems
25. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Tapping
Plan Maintenance Procedures
Digital Signature
Business Unit Recovery
26. Guidelines within an organization that control the rules and configurations of an IDS
Crisis
Governance
Masked/Interruptible
Site Policy
27. A unit of execution
Data Diddler
Accurate
TNI (Red Book)
Threads
28. Reduces causes of fire
War Dialing
Restoration
Fire Prevention
Liability
29. Owner directed mediation of access
Data Warehouse
Mitigate
Discretionary
Multi-Tasking
30. A mathematical tool for verifying no unintentional changes have been made
Digital Certificate
Remanence
Prevention
Checksum
31. A set of laws that the organization agrees to be bound by
Running
Disaster Recovery Teams (Business Recovery Teams)
Administrative Law
Authorization
32. Converts source code to an executable
Compiler
Surge Suppressor
Fraggle
Data Owner
33. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Degauss
Isolation
Watermarking
Critical Infrastructure
34. Location to perform the business function
ISO/IEC 27001
Alternate Site
Exercise
Patch Management
35. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Business Records
Relocation
Accreditation
Operating
36. OOP concept of an object at runtime
Common Criteria
Mitigate
Object
Instance
37. To reduce sudden rises in current
Surge Suppressor
Site Policy
Accreditation
Key Management
38. Location where coordination and execution of BCP or DRP is directed
Entrapment
Sampling
Patent
Emergency Operations Center (EOC)
39. For PKI - decertify an entities certificate
Multi-Tasking
Kernel
Revocation
Labeling
40. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Plain Text
Standalone Test
3 Types of harm Addressed in computer crime laws
Multi-Core
41. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Data Integrity
JPEG (Joint Photographic Experts Group)
Disaster
42. Try a list of words in passwords or encryption keys
Orange Book C Classification
Dictionary Attack
User
CobiT
43. A record that must be preserved and available for retrieval if needed.
Stopped
2-Phase Commit
Vital Record
Trusted Computing Base
44. Line by line translation from a high level language to machine code
Interpreter
Cross Training
Liability
Archival Data
45. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Collisions
Technical Access Controls
Public Key Infrastructure (PKI)
Total Risk
46. A backup of data located where staff can gain access immediately
Business Continuity Planning (BCP)
Integrated Test
On-Site
Memory Management
47. Lower frequency noise
Race Condition
Radio Frequency Interference (RFI)
Business Continuity Program
Orange Book C2 Classification
48. Objects or programming that looks the different but act same
Hijacking
Polymorphism
Multi-Party Control
Accountability
49. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Activation
Concentrator
Top Secret
Object Reuse
50. A back up type - where the organization has excess capacity in another location.
Multi-Processor
Distributed Processing
Hub
Disaster Recovery Teams (Business Recovery Teams)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests