SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Data Backups
IDS Intrusion Detection System
Conflict Of Interest
Classification
2. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Emanations
Confidence Value
Side Channel Attack
Layering
3. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.
Near Site
Secondary Storage
Electrostatic Discharge
Risk Mitigation
4. An unintended communication path
Forward Recovery
Covert Channel
Isolation
Identification
5. Interception of a communication session by an attacker.
Hijacking
File Extension
Side Channel Attack
Dangling Pointer
6. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Isolation
Byte Level Deletion
Kerberos
Public Key Infrastructure (PKI)
7. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Payload
Quantitative
Full Test (Full Interruption)
Cryptology
8. Physical description on the exterior of an object that communicates the existence of a label
False Negative
Quantitative
Marking
Mixed Law System
9. For PKI - to have more than one person in charge of a sensitive function
Control Type
Distributed Processing
Multi-Party Control
Compartmentalize
10. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
One Time Pad
Business Continuity Steering Committee
Service Bureau
Primary Storage
11. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Certification
Least Privilege
Business Impact Analysis
Switches
12. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Control
Public Key Infrastructure (PKI)
Domain
Keystroke Logging
13. Potentially compromising leakage of electrical or acoustical signals.
Generator
Patch Panels
Mirroring
Emanations
14. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Isolation
Total Risk
Pointer
Data Warehouse
15. Granular decision by a system of permitting or denying access to a particular resource on the system
Examples of technical security components
Distributed Processing
Authorization
Electronic Vaulting
16. Unchecked data which spills into another location in memory
Firmware
Monitor
Tracking
Buffer Overflow
17. Property that data is represented in the same manner at all times
Firewall
Incident Handling
Consistency
Common Law
18. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Fire Detection
Consistency
ITSEC
Inference
19. A record that must be preserved and available for retrieval if needed.
HTTP Response Splitting
Vital Record
Tapping
Debriefing/Feedback
20. Effort/time needed to overcome a protective measure
Technical Access Controls
Work Factor
IDS Intrusion Detection System
Common Criteria
21. A description of a database
ISO/IEC 27001
Data Dictionary
Content Dependent Access Control
Interference (Noise)
22. An encryption method that has a key as long as the message
Running Key
Multi-Processor
Moore's Law
Coaxial Cable
23. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Territoriality
Classification Scheme
EMI
2-Phase Commit
24. Pertaining to law - accepted by a court
HTTP Response Splitting
Admissible
Stopped
Information Flow Model
25. Substitution at the word or phrase level
Boot (V.)
Encapsulation
Code
Proprietary
26. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Examples of technical security components
Control Category
TCSEC (Orange Book)
Detective
27. Initial surge of current
Backup
Inrush Current
Business Unit Recovery
Reference Monitor
28. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Virtual Memory
Access Control Attacks
Alert/Alarm
Recovery Point Objective (RPO)
29. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Data Leakage
Orange Book C2 Classification
Kerckhoff's Principle
Risk Assessment
30. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Ring Protection
Spiral
Tracking
Basics Of Secure Design
31. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Alert
Uninterruptible Power Supply (UPS)
Non-Discretionary Access Control
Source Routing Exploitation
32. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Near Site
Atomicity
Admissible
Trusted Computing Base
33. Two different keys decrypt the same cipher text
Alternate Data Streams (File System Forks)
Key Clustering
Critical Infrastructure
Permutation /Transposition
34. Organized group of compromised computers
Running
Botnet
Fiber Optics
Side Channel Attack
35. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Control Type
High-Risk Areas
5 Rules Of Evidence
Firewall
36. To jump to a conclusion
Identification
Distributed Processing
Radio Frequency Interference (RFI)
Inference
37. Requirement of access to data for a clearly defined purpose
Need-To-Know
Steganography
True Attack Stimulus
Alert
38. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Object Oriented Programming (OOP)
Source Routing Exploitation
Orange Book C2 Classification
Copyright
39. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Algorithm
Multilevel Security System
Authentication
Emergency
40. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Business Continuity Program
User Mode (problem or program state)
Mandatory Access Control (MAC)
Business Continuity Planning (BCP)
41. To execute more than one instruction at an instant in time
Cross Training
Information Risk Management (IRM)
Multi-Processing
Mandatory
42. Someone who want to know how something works - typically by taking it apart
Mandatory Access Control (MAC)
Boot (V.)
Hacker
Capability Tables
43. The problems solving state - the opposite of supervisor mode
Admissible
Disaster Recovery Teams (Business Recovery Teams)
Distributed Processing
User Mode (problem or program state)
44. Event(s) that cause harm
Distributed Processing
Incident Response
Sniffing
Incident
45. Those who initiate the attack
Threat Agent
Sampling
Virtual Memory
File Level Deletion
46. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
BCP Testing Drills and Exercises
Near Site
Operational Impact Analysis
Non-Repudiation
47. Potentially retrievable data residue that remains following intended erasure of data.
Bumping
Full-Interruption test
Off-Site Storage
Remanence
48. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Investigation
Incident Response Team
Quantitative Risk Analysis
Generator
49. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Virtual Memory
Privacy Laws
Mobile Recovery
Compartmentalize
50. Pertaining to law - high degree of veracity
Interpreter
Bit
Accurate
Computer System Evidence
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests