SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Guidelines within an organization that control the rules and configurations of an IDS
Site Policy
Compensating
Eavesdropping
Accreditation
2. Responsibility for actions
TIFF (Tagged Image File Format)
Concentrator
Liability
Recovery Time Objectives
3. System of law based upon what is good for society
Restoration
Mission-Critical Application
Education
Civil Or Code Law
4. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Malformed Input
Durability
Tactical
Cross-Site Scripting
5. Encryption system using shared key/private key/single key/secret key
Symmetric
The ACID Test
Standard
Architecture
6. Evidence must be: admissible - authentic - complete - accurate - and convincing
5 Rules Of Evidence
Recovery Time Objectives
Domain
Log
7. A group or network of honeypots
Blackout
Disaster Recovery Plan
Honeynet
Proxies
8. Hitting a filed down key in a lock with a hammer to open without real key
Proprietary
Trade Secret
Bumping
Vital Record
9. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Mission-Critical Application
Change Control
Lattice
Redundant Array Of Independent Drives (RAID)
10. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Phishing
Trojan Horse
Source Routing Exploitation
Access Control
11. Owner directed mediation of access
Forward Recovery
Shift Cipher (Caesar)
Discretionary
Custodian
12. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Kerckhoff's Principle
Database Replication
Fire Prevention
Business Recovery Timeline
13. Potential danger to information or systems
Threats
Lattice
Shadowing (file shadowing)
Record Level Deletion
14. Of a system without prior knowledge by the tester or the tested
Orange Book B1 Classification
Cross Training
Byte Level Deletion
Double Blind Testing
15. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Electromagnetic Interference (EMI)
Work Factor
Tar Pits
Simulation
16. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Gateway
Business Interruption Insurance
Corrective
Deletion
17. High level design or model with a goal of consistency - integrity - and balance
Key Management
Data Recovery
Architecture
Tar Pits
18. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Job Training
State Machine Model
Business Impact Analysis
Satellite
19. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Code
Critical Records
Strong Authentication
Operational
20. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Hard Disk
Bumping
Territoriality
Disaster Recovery Tape
21. Ertaining to a number system that has just two unique digits.
Binary
Copyright
Reference Monitor
Interception
22. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
TEMPEST
Business Impact Assessment (BIA)
Full Test (Full Interruption)
False (False Positive)
23. Third party processes used to organize the implementation of an architecture
Quantitative Risk Analysis
MOM
Framework
Hacker
24. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Non-Interference
Tar Pits
ISO/IEC 27001
Administrative Access Controls
25. A program with an inappropriate second purpose
Fire Prevention
Multi-Processing
Trojan Horse
Threats
26. A physical enclosure for verifying identity before entry to a facility
Data Custodian
Common Law
Object Oriented Programming (OOP)
Mantrap (Double Door System)
27. A system that enforces an access control policy between two networks.
Notification
Firewalls
Analysis
Brownout
28. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Business Impact Analysis
Remote Access Trojan
Recovery Period
Plaintext
29. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Information Owner
High-Risk Areas
Cache
Rogue Access Points
30. Granular decision by a system of permitting or denying access to a particular resource on the system
Kerckhoff's Principle
Authorization
Reciprocal Agreement
Journaling
31. Collection of data on business functions which determines the strategy of resiliency
Generator
Debriefing/Feedback
Discretionary
Business Impact Assessment (BIA)
32. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
File Extension
Business Unit Recovery
Certification Authority
Keystroke Logging
33. A choice in risk management - to convince another to assume risk - typically by payment
5 Rules Of Evidence
Transfer
Binary
Security Kernel
34. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
True Attack Stimulus
Crisis
Administrative
Total Risk
35. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Layering
Primary Storage
Security Clearance
Information Risk Management (IRM)
36. To know more than one job
Key Management
Cross Training
Critical Records
Hearsay Evidence
37. An image compression standard for photographs
Strong Authentication
JPEG (Joint Photographic Experts Group)
Overlapping Fragment Attack
Access Control Attacks
38. One entity with two competing allegiances
Phishing
Liability
Conflict Of Interest
Damage Assessment
39. The connection between a wireless and wired network.
Alternate Data Streams (File System Forks)
Mandatory Access Control (MAC)
Targeted Testing
Access Point
40. High degree of visual control
Least Privilege
Reference Monitor
Surveillance
Administrative Law
41. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Fire Suppression
Smurf
Patch Management
Fragmented Data
42. A disturbance that degrades performance of electronic devices and electronic communications.
Monitor
Business Recovery Team
Radio Frequency Interference (RFI)
Emergency Operations Center (EOC)
43. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Asymmetric
Test Plan
Revocation
Disaster Recovery Plan
44. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Masked/Interruptible
Data Custodian
Sampling
Deleted File
45. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Fire Prevention
Reciprocal Agreement
Inheritance
Degauss
46. A mobilized resource purchased or contracted for the purpose of business recovery.
3 Types of harm Addressed in computer crime laws
Orange Book B1 Classification
Mobile Recovery
Resumption
47. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Technical Access Controls
Key Escrow
Walk Though
Masked/Interruptible
48. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Parallel Test
Class
Security Blueprint
Public Key Infrastructure (PKI)
49. A device that converts between digital and analog representation of data.
Mandatory Vacations
EMI
Modems
Kerckhoff's Principle
50. Forging of an IP address.
Failure Modes and Effect Analysis (FEMA)
Examples of non-technical security components
IP Address Spoofing
Journaling
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests