SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
System Life Cycle
File Sharing
Tar Pits
Civil Law
2. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Fault Tolerance
Restoration
Steganography
Disaster Recovery Teams (Business Recovery Teams)
3. Define the way in which the organization operates.
Interpreter
Proprietary
Identification
Reference Monitor
4. Alerts personnel to the presence of a fire
CPU Cache
Aggregation
Fire Detection
Virus
5. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Buffer Overflow
Capability Tables
Orange Book C2 Classification
Top Secret
6. A condition in which neither party is willing to stop their activity for the other to complete
Information Flow Model
Deadlock
Business Impact Assessment (BIA)
Exposure
7. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Database Replication
Open Mail Relay Servers
Classification
File Server
8. Responsibility for actions
Worldwide Interoperability for Microwave Access (WI-MAX )
Sampling
Interpreter
Liability
9. Pertaining to law - no omissions
Complete
Orange Book B1 Classification
Blackout
Integrated Test
10. Some systems are actually run at the alternate site
Mobile Recovery
Virtual Memory
Parallel Test
DR Or BC Coordinator
11. Location where coordination and execution of BCP or DRP is directed
Non-Interference
Emergency Operations Center (EOC)
ff Site
Certification Authority
12. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Business Unit Recovery
ISO/IEC 27001
Territoriality
Reference Monitor
13. Statistical probabilities of a collision are more likely than one thinks
On-Site
Operational
Off-Site Storage
Birthday Attack
14. A covert storage channel on the file attribute
Identification
Standard
Data Warehouse
Alternate Data Streams (File System Forks)
15. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Processes are Isolated By
Business Interruption
File
Education
16. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Mission-Critical Application
Monitor
Least Privilege
Public Key Infrastructure (PKI)
17. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Information Technology Security Evaluation Criteria - ITSEC
Machine Language (Machine Code)
Steganography
Wireless Fidelity (Wi-Fi )
18. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Trusted Computing Base
Critical Records
Work Factor
Surveillance
19. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Fragmented Data
Side Channel Attack
Administrative Law
Fire Classes
20. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Bollard
Double Blind Testing
Encryption
Critical Functions
21. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Incident Response
Cryptanalysis
Technical Access Controls
Spyware
22. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Administrative Law
Plaintext
Uninterruptible Power Supply (UPS)
War Dialing
23. Ertaining to a number system that has just two unique digits.
File Extension
Binary
State Machine Model
Cipher Text
24. For PKI - to have more than one person in charge of a sensitive function
Strategic
Masquerading
Multi-Party Control
Common Criteria
25. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Qualitative
SQL Injection
Journaling
Shielding
26. Forging of an IP address.
Structured Walkthrough
Procedure
Key Escrow
IP Address Spoofing
27. Tool which mediates access
Vulnerability
Control
Databases
Business Records
28. A process state - (blocked) needing input before continuing
Orange Book D Classification
Wait
False Negative
Mantrap (Double Door System)
29. A temporary public file to inform others of a compromised digital certificate
Certificate Revocation List (CRL)
Trusted Computing Base
Recovery
Process Isolation
30. Controls for termination of attempt to access object
Intrusion Prevention Systems
Near Site
Mandatory
Cipher Text
31. Intellectual property protection for the expression of an idea
Copyright
Trade Secret
Cryptography
CPU Cache
32. To start business continuity processes
Trusted Computing Base
Activation
Tar Pits
2-Phase Commit
33. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Containment
Restoration
Computer Forensics
Discretionary Access Control (DAC)
34. Data or interference that can trigger a false positive
Noise
Recovery Period
Surveillance
Keystroke Logging
35. Low level - pertaining to planning
Tactical
Admissible
Data Diddler
Territoriality
36. Those who initiate the attack
Overlapping Fragment Attack
TIFF (Tagged Image File Format)
Threat Agent
Administrative Access Controls
37. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Hub
Alternate Site
Multilevel Security System
Mirroring
38. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Near Site
Notification
Data Owner
Phishing
39. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Patch Management
File Server
Virtual Memory
Database Replication
40. Subject based description of a system or a collection of resources
Capability Tables
Disaster Recovery Tape
File Shadowing
System Life Cycle
41. System of law based upon what is good for society
Orange Book C2 Classification
Civil Or Code Law
Cipher Text
Bumping
42. A design methodology which addresses risk early and often
Disaster Recovery Plan
Spiral
Mandatory Access Control (MAC)
Job Rotation
43. Vehicle stopping object
EMI
Bollard
Worm
Radio Frequency Interference (RFI)
44. A distributed system's transaction control that requires updates to complete or rollback
Policy
Data Backups
2-Phase Commit
Surge Suppressor
45. Used to code/decode a digital data stream.
Legacy Data
Access Control Lists
Codec
Containment
46. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Investigation
Hub
Multi-Processor
Corrective
47. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Initialization Vector
Cold Site
Virus
One Time Pad
48. A subnetwork with storage devices servicing all servers on the attached network.
Administrative
Debriefing/Feedback
Privacy Laws
Storage Area Network (SAN)
49. A race condition where the security changes during the object's access
Time Of Check/Time Of Use
Recovery Period
Modification
Degauss
50. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Network Attached Storage (NAS)
Copyright
File Shadowing
Domain
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests