SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Risk Assessment / Analysis
Secondary Storage
Injection
Operational
2. Dedicated fast memory located on the same board as the CPU
Incident Handling
CPU Cache
Intrusion Prevention Systems
Virtual Memory
3. The core logic engine of an operating system which almost never changes
Investigation
Compensating
Workaround Procedures
Kernel
4. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Identification
System Life Cycle
Orange Book C Classification
Emergency Procedures
5. Initial surge of current
Picking
Contact List
Inrush Current
File Sharing
6. Autonomous malware that requires a flaw in a service
Common Law
Redundant Servers
Cold Site
Worm
7. Narrow scope examination of a system
Patent
Critical Functions
Targeted Testing
Access Control Lists
8. To create a copy of data as a precaution against the loss or damage of the original data.
Maximum Tolerable Downtime (MTD)
Backup
Patch Panels
Quantitative Risk Analysis
9. A programming device use in development to circumvent controls
Assembler
Hub
TEMPEST
Trapdoors (Backdoors) (Maintenance Hooks)
10. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Time Of Check/Time Of Use
Embedded Systems
Business Continuity Steering Committee
Byte
11. Physical description on the exterior of an object that communicates the existence of a label
State Machine Model
Multiplexers
Marking
One Time Pad
12. Collection of data on business functions which determines the strategy of resiliency
Business Impact Assessment (BIA)
Certification Authority
Preemptive
Honeypot
13. A type of attack involving attempted insertion - deletion or altering of data.
Modification
Tort
Reference Monitor
Hash Function
14. Requirement of access to data for a clearly defined purpose
Transfer
Criminal Law
Need-To-Know
Key Escrow
15. Something that happened
Event
Quantitative Risk Analysis
File
MOM
16. Fault tolerance for power
Access Control Lists
Plain Text
Generator
Critical Functions
17. Real-time - automatic and transparent backup of data.
Bridge
System Downtime
Remote Journaling
Firewall
18. A hash that has been further encrypted with a symmetric algorithm
Botnet
Chain of Custody
Standard
Keyed-Hashing For Message Authentication
19. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Hard Disk
Least Privilege
IP Address Spoofing
Event
20. The first rating that requires security labels
Orange Book B1 Classification
Keyed-Hashing For Message Authentication
Running
Supervisor Mode (monitor - system - privileged)
21. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Data Diddler
Electromagnetic Interference (EMI)
Test Plan
Byte
22. Induces a crime - tricks a person - and is illegal
Surge Suppressor
Honeynet
Entrapment
Sampling
23. Data or interference that can trigger a false positive
Noise
Byte Level Deletion
Symmetric
Backup
24. Written suggestions that direct choice to a few alternatives
Guidelines
Metadata
Tactical
False Negative
25. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Fire Classes
Least Privilege
Mandatory Vacations
Masked/Interruptible
26. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Recovery Point Objective (RPO)
Mock Disaster
Business Continuity Steering Committee
Switches
27. Quantity of risk remaining after a control is applied
Embedded Systems
Fragmented Data
Proxies
Residual Risk
28. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Interpreter
Brouter
Emergency Procedures
Plaintext
29. Mitigate damage by isolating compromised systems from the network.
Highly Confidential
Containment
False Negative
Tapping
30. To evaluate the current situation and make basic decisions as to what to do
5 Rules Of Evidence
Masquerading
Non-Interference
Triage
31. For PKI - to store another copy of a key
Encapsulation
Tracking
Checklist Test (desk check)
Key Escrow
32. A collection of information designed to reduce duplication and increase integrity
Near Site
Key Clustering
Machine Language (Machine Code)
Databases
33. To reduce sudden rises in current
Forward Recovery
Surge Suppressor
Hijacking
Inheritance
34. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Recovery
Resumption
Classification Scheme
Spiral
35. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Cryptovariable
Picking
Business Interruption
Denial Of Service
36. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Incident Response Team
Message Digest
Strong Authentication
Satellite
37. A basic level of network access control that is based upon information contained in the IP packet header.
UPS
Least Privilege
Packet Filtering
Transfer
38. To execute more than one instruction at an instant in time
Multi-Processing
Open Mail Relay Servers
Cold Site
Message Digest
39. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Overlapping Fragment Attack
Side Channel Attack
Desk Check Test
Locard's Principle
40. Reprogrammable basic startup instructions
Qualitative
Least Privilege
Firmware
Digital Signature
41. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Adware
Mobile Recovery
Risk Mitigation
Business Unit Recovery
42. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Mandatory Access Control (MAC)
Analysis
Rootkit
Common Criteria
43. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Simulation
Restoration
Data Integrity
False Attack Stimulus
44. Recovery alternative - short-term - high cost movable processing location
File
Top Secret
Method
Mobile Site
45. Line noise that is superimposed on the supply circuit.
Targeted Testing
Examples of non-technical security components
Worldwide Interoperability for Microwave Access (WI-MAX )
Transients
46. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Parallel Test
Crisis
Mobile Site
3 Types of harm Addressed in computer crime laws
47. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Computer System Evidence
Running
Access Control Matrix
Critical Records
48. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Kerberos
Process Isolation
File Server
Payload
49. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Distributed Denial Of Service
Security Domain
Multi-Party Control
Disaster Recovery Tape
50. An encryption method that has a key as long as the message
Concentrator
Information Risk Management (IRM)
Surveillance
Running Key
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests