SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program with an inappropriate second purpose
Trojan Horse
Tort
Disaster Recovery Tape
Authentication
2. Subject based description of a system or a collection of resources
Control
Capability Tables
Tar Pits
Job Rotation
3. Another subject cannot see an ongoing or pending update until it is complete
Cryptanalysis
Accreditation
Isolation
File Server
4. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Proxies
TIFF (Tagged Image File Format)
Hearsay
Supervisor Mode (monitor - system - privileged)
5. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Checklist Test
Activation
Databases
Recovery
6. Highest level of authority at EOC with knowledge of the business process and the resources available
Custodian
Incident Manager
Integrated Test
Non-Discretionary Access Control
7. Intellectual property protection for marketing efforts
HTTP Response Splitting
Mirrored Site
Database Replication
Trademark
8. State of computer - to be running a process
Picking
Security Blueprint
Operating
Intrusion Detection Systems
9. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Identification
Digital Signature
Non-Discretionary Access Control
Surge Suppressor
10. To reduce sudden rises in current
Voice Over IP (VOIP)
User
Archival Data
Surge Suppressor
11. Disruption of operation of an electronic device due to a competing electromagnetic field.
Electromagnetic Interference (EMI)
Orange Book D Classification
ISO/IEC 27001
EMI
12. Pertaining to law - lending it self to one side of an argument
Data Owner
Convincing
IP Address Spoofing
Electronic Vaulting
13. Small data warehouse
Electrostatic Discharge
Risk Assessment
Pervasive Computing and Mobile Computing Devices
Data Marts
14. Independent malware that requires user interaction to execute
Denial Of Service
Mantrap (Double Door System)
Secondary Storage
Virus
15. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Lattice
Critical Infrastructure
Prevention
Application Programming Interface
16. Pertaining to law - no omissions
Lattice
Directive
Contingency Plan
Complete
17. Define the way in which the organization operates.
Simulation Test
Incident Response
Proprietary
5 Rules Of Evidence
18. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Labeling
Highly Confidential
Public Key Infrastructure (PKI)
Tracking
19. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Alternate Data Streams (File System Forks)
Storage Area Network (SAN)
Reference Monitor
Chain of Custody
20. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Identification
Complete
Worldwide Interoperability for Microwave Access (WI-MAX )
Simulation
21. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Access Control Matrix
Repeaters
Disaster Recovery Teams (Business Recovery Teams)
Certificate Revocation List (CRL)
22. Actions measured against either a policy or what a reasonable person would do
Source Routing Exploitation
Due Diligence
Mock Disaster
Brownout
23. Creation distribution update and deletion
Codec
Information Technology Security Evaluation Criteria - ITSEC
Overlapping Fragment Attack
Key Management
24. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Rollback
Record Level Deletion
Common Criteria
Disk Mirroring
25. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Method
Legacy Data
Distributed Processing
Need-To-Know
26. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Acronym for American Standard Code for Information Interchange (ASCII)
Cipher Text
Sniffing
Protection
27. A control after attack
Countermeasure
DR Or BC Coordinator
Boot (V.)
Object Oriented Programming (OOP)
28. A design methodology which executes in a linear one way fashion
Surge Suppressor
Surveillance
Waterfall
MOM
29. Uncleared buffers or media
Object Reuse
Ring Protection
Multi-Party Control
Crisis
30. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Brownout
Keyed-Hashing For Message Authentication
Critical Infrastructure
Concatenation
31. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Highly Confidential
Quantitative Risk Analysis
Warm Site
Crisis
32. System mediation of access with the focus on the context of the request
Content Dependent Access Control
Data Marts
Alarm Filtering
Chain of Custody
33. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Remote Access Trojan
Disaster
System Life Cycle
Triage
34. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Hub
Tracking
Trapdoors (Backdoors) (Maintenance Hooks)
Source Routing Exploitation
36. Mathematical function that determines the cryptographic operations
Algorithm
Vulnerability
Operating
Radio Frequency Interference (RFI)
37. A collection of data or information that has a name
Tort
Hearsay Evidence
Electronic Vaulting
File
38. High level design or model with a goal of consistency - integrity - and balance
CPU Cache
Architecture
Kernel
Patch Panels
39. Unauthorized access of network devices.
Multi-Tasking
Physical Tampering
BCP Testing Drills and Exercises
Boot (V.)
40. Someone who wants to cause harm
Administrative Laws
Firewalls
Encipher
Attacker (Black hat - Hacker)
41. Joining two pieces of text
Concatenation
Side Channel Attack
Running
Enticement
42. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Microwave
Failure Modes and Effect Analysis (FEMA)
Payload
File Server
43. A programming design concept which abstracts one set of functions from another in a serialized fashion
Layering
Kernel
Procedure
Guidelines
44. A protocol for the efficient transmission of voice over the Internet
Data Custodian
Policy
Voice Over IP (VOIP)
Monitor
45. Try a list of words in passwords or encryption keys
Dictionary Attack
Failure Modes and Effect Analysis (FEMA)
Storage Area Network (SAN)
Data Custodian
46. The partial or full duplication of data from a source database to one or more destination databases.
Intrusion Prevention Systems
Database Replication
Permutation /Transposition
Picking
47. The core of a computer that calculates
Labeling
IP Fragmentation
Encryption
Central Processing Unit (CPU)
48. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Trusted Computing Base
Masquerading
Injection
Processes are Isolated By
49. Substitution at the word or phrase level
Information Flow Model
Incident Response Team
Method
Code
50. A device that converts between digital and analog representation of data.
Multi-Programming
Modems
Procedure
Blind Testing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests