SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Critical Infrastructure
Revocation
Network Attached Storage (NAS)
Fire Suppression
2. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Access Control Attacks
Exercise
Virtual Memory
Emergency
3. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Masquerading
ff Site
Routers
Near Site
5. Written core statements that rarely change
File Level Deletion
Policy
Off-Site Storage
Bridge
6. A race condition where the security changes during the object's access
High-Risk Areas
Time Of Check/Time Of Use
Event
Risk Assessment / Analysis
7. Low level - pertaining to planning
Gateway
Picking
Fire Classes
Tactical
8. The collection and summation of risk data relating to a particular asset and controls for that asset
Risk Assessment
Content Dependent Access Control
Infrastructure
Embedded Systems
9. A unit of execution
Contact List
Administrative Access Controls
Gateway
Threads
10. To reduce fire
Fire Suppression
Fraggle
Data Marts
Orange Book C2 Classification
11. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Business Interruption
Processes are Isolated By
Honeypot
Protection
12. Independent malware that requires user interaction to execute
Inference
Checksum
Virus
Non-Repudiation
13. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Fire Classes
Fire Prevention
Job Rotation
SYN Flooding
14. A secure connection to another network.
Contact List
Remanence
Separation Of Duties
Gateway
15. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Storage Area Network (SAN)
Non-Discretionary Access Control
Orange Book B2 Classification
Emergency Procedures
16. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Information Risk Management (IRM)
Disk Mirroring
Discretionary Access Control (DAC)
Smurf
17. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Brouter
Acronym for American Standard Code for Information Interchange (ASCII)
Common Law
Process Isolation
18. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Concentrator
Journaling
Encapsulation
Structured Walk-Through Test
19. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Trusted Computing Base
Cryptography
ff Site
Multi-Core
20. Subject based description of a system or a collection of resources
Capability Tables
Pervasive Computing and Mobile Computing Devices
Job Training
Vital Record
21. Location to perform the business function
Aggregation
Disaster Recovery Tape
Alternate Site
Symmetric
22. Quantity of risk remaining after a control is applied
Residual Risk
Quantitative Risk Analysis
Record Level Deletion
Change Control
23. Eavesdropping on network communications by a third party.
Remote Access Trojan
Call Tree
Tapping
Recovery Strategy
24. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Class
Kernel
Virtual Memory
Accreditation
25. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Intrusion Detection Systems
Forensic Copy
Common Law
Multi-Tasking
26. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Generator
3 Types of harm Addressed in computer crime laws
Data Backup Strategies
Structured Walk-Through Test
27. A electronic attestation of identity by a certificate authority
Hot Site
Hub
Digital Certificate
Administrative Access Controls
28. Code breaking - practice of defeating the protective properties of cryptography.
Need-To-Know
2-Phase Commit
Cryptanalysis
Classification Scheme
29. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Trusted Computing Base
Critical Infrastructure
Restoration
Plain Text
30. Statistical probabilities of a collision are more likely than one thinks
Birthday Attack
Risk Mitigation
Multi-Party Control
Method
31. The core of a computer that calculates
Brownout
Contact List
Corrective
Central Processing Unit (CPU)
32. Renders the file inaccessible to the operating system - available to reuse for data storage.
Examples of non-technical security components
File Level Deletion
Territoriality
Archival Data
33. Intellectual property protection for an confidential and critical process
Picking
Trade Secret
Data Hiding
Admissible
34. Disruption of operation of an electronic device due to a competing electromagnetic field.
EMI
Key Management
Shift Cipher (Caesar)
Masquerading
35. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Fire Classes
Memory Management
Binary
Operational Exercise
36. Specific format of technical and physical controls that support the chosen framework and the architecture
Infrastructure
Sharing
Computer Forensics
Centralized Access Control Technologies
37. Real-time data backup ( Data Mirroring)
Database Shadowing
File Level Deletion
Highly Confidential
Security Domain
38. Final purpose or result
False (False Positive)
Inference
Payload
Electronic Vaulting
39. An image compression standard for photographs
Transfer
JPEG (Joint Photographic Experts Group)
Compression
Notification
40. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.
Plain Text
Activation
Symmetric
Teardrop
41. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Certification
Analysis
Containment
Fire Classes
42. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Computer System Evidence
Disaster Recovery Tape
Switches
Workaround Procedures
43. All of the protection mechanism in a computer system
Emergency Procedures
Burn
Business Continuity Program
Trusted Computing Base
44. Controls for logging and alerting
Bollard
Intrusion Detection Systems
User Mode (problem or program state)
Control Category
45. To reduce sudden rises in current
Surge Suppressor
Microwave
Hard Disk
Encapsulation
46. Act of luring an intruder and is legal.
Interference (Noise)
Business Records
Enticement
Checksum
47. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Enticement
Consistency
Reciprocal Agreement
Sequence Attacks
48. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Open Mail Relay Servers
Cross-Site Scripting
System Life Cycle
ISO/IEC 27001
49. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Secondary Storage
Cipher Text
Supervisor Mode (monitor - system - privileged)
System Life Cycle
50. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Critical Infrastructure
Deletion
Kerckhoff's Principle
Recovery Strategy
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests