SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recording the Who What When Where How of evidence
Hearsay
Examples of technical security components
SYN Flooding
Chain Of Custody
2. Eavesdropping on network communications by a third party.
Key Management
Multi-Tasking
Certification Authority
Sniffing
3. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Uninterruptible Power Supply (UPS)
Remote Access Trojan
Malformed Input
UPS
4. One of the key benefits of a network is the ability to share files stored on the server among several users.
Accreditation
File Sharing
Proprietary
Hub
5. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Record Level Deletion
Instance
File Extension
Switches
6. A disturbance that degrades performance of electronic devices and electronic communications.
Active Data
Operational
Radio Frequency Interference (RFI)
Civil Or Code Law
7. The core logic engine of an operating system which almost never changes
Kernel
Object Reuse
Resumption
Smurf
8. Substitution at the word or phrase level
Code
Standalone Test
Record Level Deletion
Sequence Attacks
9. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Bit
Compiler
Deletion
Processes are Isolated By
10. Fault tolerance for power
Enticement
Control Category
Detective
Generator
11. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Sharing
Mission-Critical Application
Data Backup Strategies
Routers
12. Claiming another's identity at a physical level
Risk Assessment
Alert/Alarm
File Server
Masquerading
13. Weak evidence
Brute Force
Business Recovery Team
Hearsay
Mirroring
14. Reprogrammable basic startup instructions
Firmware
Convincing
Trade Secret
Instance
15. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. A documented battle plan for coordinating response to incidents.
Multi-Processor
Governance
Investigation
Incident Handling
17. To stop damage from spreading
Containment
Checksum
Prevention
Sequence Attacks
18. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
Machine Language (Machine Code)
Operational
War Dialing
Bit
19. A covert storage channel on the file attribute
Alternate Data Streams (File System Forks)
Hub
Source Routing Exploitation
Protection
20. Recovery alternative - complete duplication of services including personnel
Disaster Recovery Teams (Business Recovery Teams)
Mirrored Site
Non-Interference
Network Attached Storage (NAS)
21. Act of luring an intruder and is legal.
Call Tree
Enticement
E-Mail Spoofing
Fragmented Data
22. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Certification
Framework
Business Unit Recovery
Masked/Interruptible
23. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Remote Access Trojan
On-Site
Fiber Optics
Compartmentalize
24. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Attacker (Black hat - Hacker)
Failure Modes and Effect Analysis (FEMA)
Incident Response
Risk Assessment
26. Event(s) that cause harm
Overlapping Fragment Attack
Bridge
Modification
Incident
27. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Deleted File
Cryptanalysis
Copyright
Remote Journaling
28. The hard drive
Secondary Storage
Multi-Processor
Notification
Checkpoint
29. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Kerberos
Territoriality
High-Risk Areas
Privacy Laws
30. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Standalone Test
Teardrop
HTTP Response Splitting
Targeted Testing
31. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Territoriality
Internal Use Only
Trapdoors (Backdoors) (Maintenance Hooks)
Accurate
32. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Isolation
Off-Site Storage
IDS Intrusion Detection System
Critical Infrastructure
33. Renders the file inaccessible to the operating system - available to reuse for data storage.
Criminal Law
File Level Deletion
Discretionary Access Control (DAC)
Machine Language (Machine Code)
34. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Rootkit
Worldwide Interoperability for Microwave Access (WI-MAX )
Brouter
Critical Infrastructure
35. Control type- that is communication based - typically written or oral
Highly Confidential
Structured Walk-Through Test
Mixed Law System
Administrative
36. Owner directed mediation of access
Database Replication
Faraday Cage/ Shield
Vulnerability
Discretionary
37. Narrow scope examination of a system
Targeted Testing
Accurate
Remanence
Threads
38. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Administrative Laws
Database Shadowing
Guidelines
Substitution
39. Wrong against society
Custodian
Criminal Law
Certification
Targeted Testing
40. Intellectual property protection for an confidential and critical process
Injection
Supervisor Mode (monitor - system - privileged)
Trade Secret
Intrusion Prevention Systems
41. Power surge
Electrostatic Discharge
Cipher Text
Alert/Alarm
Hard Disk
42. Initial surge of current
Inrush Current
Walk Though
Classification
Trusted Computing Base
43. An availability attack - to consume resources to the point of exhaustion
Job Training
Denial Of Service
Phishing
Cache
44. A physical enclosure for verifying identity before entry to a facility
Intrusion Detection Systems
Mantrap (Double Door System)
Quantitative
Incident Handling
45. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Key Space
Business Interruption Insurance
Attacker (Black hat - Hacker)
Kerckhoff's Principle
46. Data or interference that can trigger a false positive
Checklist Test (desk check)
Alert
Noise
Cryptography
47. To load the first piece of software that starts a computer.
False (False Positive)
Boot (V.)
Exercise
Detective
48. Objects or programming that looks the different but act same
Running Key
Polymorphism
Shadowing (file shadowing)
DR Or BC Coordinator
49. Control category - more than one control on a single asset
Keyed-Hashing For Message Authentication
Full Test (Full Interruption)
Compensating
Non-Repudiation
50. Low level - pertaining to planning
Tactical
Concentrator
Physical Tampering
Information Owner
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests