SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
ff Site
Content Dependent Access Control
Interpreter
Residual Risk
2. Some systems are actually run at the alternate site
Parallel Test
Capability Tables
Policy
Brute Force
3. To create a copy of data as a precaution against the loss or damage of the original data.
Technical Access Controls
ISO/IEC 27002
Backup
Business Continuity Steering Committee
4. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Side Channel Attack
Full Test (Full Interruption)
Parallel Test
Polyalphabetic
5. Memory management technique which allows data to be moved from one memory address to another
Inrush Current
Key Management
Source Routing Exploitation
Relocation
6. Employment education done once per position or at significant change of function
Job Training
Acronym for American Standard Code for Information Interchange (ASCII)
Decipher
Standard
7. The principles a person sets for themselves to follow
Ethics
Inrush Current
Confidence Value
Accreditation
8. Object based description of a single resource and the permission each subject
Noise
Multi-Tasking
Access Control Lists
Deletion
9. A mobilized resource purchased or contracted for the purpose of business recovery.
Processes are Isolated By
Prevention
Microwave
Mobile Recovery
10. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Cryptanalysis
Intrusion Prevention Systems
Computer System Evidence
Interference (Noise)
11. Recovery alternative which outsources a business function at a cost
Redundant Array Of Independent Drives (RAID)
Active Data
Ring Protection
Service Bureau
12. Vehicle stopping object
Intrusion Detection Systems
Bollard
Electronic Vaulting
Virtual Memory
13. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things
MOM
Disaster
Non-Repudiation
Infrastructure
14. A mathematical tool for verifying no unintentional changes have been made
Checksum
Firewalls
Plan Maintenance Procedures
Emergency Procedures
15. Control type- that is communication based - typically written or oral
Modification
Source Routing Exploitation
Inrush Current
Administrative
16. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Blind Testing
ITSEC
Overlapping Fragment Attack
State Machine Model
17. Pertaining to law - lending it self to one side of an argument
Convincing
Salami
Hub
Digital Signature
18. Objects or programming that looks the different but act same
Assembler
Polymorphism
Permutation /Transposition
Mobile Site
19. Moving the alphabet intact a certain number spaces
Targeted Testing
Shift Cipher (Caesar)
Recovery Strategy
Backup
20. High degree of visual control
Surveillance
Radio Frequency Interference (RFI)
Walk Though
IP Fragmentation
21. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Contact List
Interpreter
Recovery Period
Accountability
22. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Concentrator
Asymmetric
Routers
Encryption
23. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Cross-Site Scripting
Crisis
Checksum
Risk Assessment
24. A condition in which neither party is willing to stop their activity for the other to complete
Classification
Deadlock
Hot Spares
Application Programming Interface
25. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Orange Book D Classification
3 Types of harm Addressed in computer crime laws
File Server
Tort
26. A record that must be preserved and available for retrieval if needed.
Vital Record
Keyed-Hashing For Message Authentication
Disaster Recovery Teams (Business Recovery Teams)
Memory Management
27. To segregate for the purposes of labeling
Transfer
Compartmentalize
Privacy Laws
Safeguard
28. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Data Hiding
Microwave
Mirroring
Emergency
29. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Recovery Period
Hearsay
Method
Legacy Data
30. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Modification
Classification
TCSEC (Orange Book)
Administrative Access Controls
31. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Code
Analysis
Radio Frequency Interference (RFI)
Cross-Site Scripting
32. Measures followed to restore critical functions following a security incident.
Alert
Recovery
Security Clearance
Key Space
33. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Source Routing Exploitation
Checksum
Authentication
Burn
34. To stop damage from spreading
Alert
Data Hiding
Vital Record
Containment
35. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
The ACID Test
Memory Management
Network Attached Storage (NAS)
Off-Site Storage
36. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Executive Succession
Hijacking
Application Programming Interface
Durability
38. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Threads
Hot Spares
Hearsay Evidence
Control Category
39. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Compartmentalize
Disaster Recovery Tape
Proxies
Double Blind Testing
40. Security policy - procedures - and compliance enforcement
Examples of non-technical security components
Non-Discretionary Access Control
Ring Protection
Content Dependent Access Control
41. With enough computing power trying all possible combinations
Inrush Current
Brute Force
Trademark
Kerckhoff's Principle
42. Part of a transaction control for a database which informs the database of the last recorded transaction
Electromagnetic Interference (EMI)
Electronic Vaulting
Faraday Cage/ Shield
Checkpoint
43. Threats x Vulnerability x Asset Value = Total Risk
Pointer
Total Risk
Orange Book C Classification
Honeypot
44. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Physical Tampering
JPEG (Joint Photographic Experts Group)
Databases
Business Continuity Steering Committee
45. Someone who want to know how something works - typically by taking it apart
Containment
Cryptovariable
Work Factor
Hacker
46. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Technical Access Controls
Authentic
Mobile Site
Concentrator
47. Periodic - automatic and transparent backup of data in bulk.
ff Site
Cache
Confidence Value
Electronic Vaulting
48. Intellectual property management technique for identifying after distribution
Moore's Law
Botnet
Watermarking
Generator
49. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Data Backup Strategies
Threat Agent
Computer Forensics
3 Types of harm Addressed in computer crime laws
50. A back up type - where the organization has excess capacity in another location.
Distributed Processing
Plan Maintenance Procedures
3 Types of harm Addressed in computer crime laws
Journaling
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests