SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Some systems are actually run at the alternate site
Open Mail Relay Servers
Lattice
Parallel Test
Access Control Lists
2. A technology that reduces the size of a file.
Boot (V.)
Orange Book D Classification
Call Tree
Compression
3. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Fiber Optics
Structured Walk-Through Test
Recovery
Encryption
4. A risk assessment method - intrinsic value
Critical Functions
Qualitative
Cross-Site Scripting
Degauss
5. Vehicle stopping object
Bollard
Security Blueprint
Electronic Vaulting
Common Criteria
6. To stop damage from spreading
Method
Administrative
Worldwide Interoperability for Microwave Access (WI-MAX )
Containment
7. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Parallel Test
Hearsay Evidence
File Extension
Identification
8. A device that converts between digital and analog representation of data.
SYN Flooding
Modems
Fire Detection
Substitution
9. Controls deployed to avert unauthorized and/or undesired actions.
Database Shadowing
Emergency Operations Center (EOC)
Prevention
Atomicity
10. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
File Extension
Control Type
Chain of Custody
Complete
11. Recovery alternative - short-term - high cost movable processing location
Inrush Current
Mobile Site
Checkpoint
Safeguard
12. Memory - RAM
Primary Storage
Copyright
Injection
Wait
13. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Information Technology Security Evaluation Criteria - ITSEC
Hacker
Tar Pits
Declaration
14. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. Memory management technique that allows two processes to run concurrently without interaction
Protection
Patch Management
Administrative Access Controls
Detection
16. Written suggestions that direct choice to a few alternatives
Guidelines
Electromagnetic Interference (EMI)
File
Residual Risk
17. A choice in risk management - to implement a control that limits or lessens negative effects
Failure Modes and Effect Analysis (FEMA)
Hijacking
Mitigate
Guidelines
18. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Byte Level Deletion
Secondary Storage
Analysis
Record Level Deletion
19. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Classification
Honeypot
True Attack Stimulus
Elements of Negligence
20. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Sequence Attacks
Alarm Filtering
Log
CPU Cache
21. Requirement of access to data for a clearly defined purpose
One Time Pad
Need-To-Know
Business Recovery Timeline
Asymmetric
22. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Uninterruptible Power Supply (UPS)
ISO/IEC 27001
Business Recovery Team
Object Reuse
23. Potential danger to information or systems
Cryptology
Threats
Restoration
Entrapment
24. The chance that something negative will occur
Double Blind Testing
Digital Certificate
Risk
Information Owner
25. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Tapping
Hot Spares
Incident Handling
Compensating
26. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Symmetric
Tar Pits
Business Unit Recovery
Information Owner
27. An attack involving the hijacking of a TCP session by predicting a sequence number.
Copyright
Sequence Attacks
Kerberos
Emergency Procedures
28. A software design technique for abstraction of a process
Metadata
Full Test (Full Interruption)
Interception
Data Hiding
29. Information about a particular data set
Firewalls
Event
State Machine Model
Metadata
30. Intellectual property protection for marketing efforts
Exercise
Prevention
Codec
Trademark
31. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Concatenation
Journaling
Site Policy Awareness
Sag/Dip
32. OOP concept of an object's abilities - what it does
Disaster
Administrative
Mission-Critical Application
Method
33. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Strategic
Disaster Recovery Teams (Business Recovery Teams)
Smurf
Crisis
34. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Attacker (Black hat - Hacker)
Discretionary
Walk Though
Business Records
35. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Voice Over IP (VOIP)
Accountability
CobiT
Proprietary
36. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Life Cycle of Evidence
Corrective
Trusted Computing Base
Tactical
37. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Electronic Vaulting
Domain
Work Factor
Internal Use Only
38. An alert or alarm that is triggered when no actual attack has taken place
False (False Positive)
Control Category
Metadata
Common Law
39. Code breaking - practice of defeating the protective properties of cryptography.
Cryptanalysis
Multi-Tasking
Incident
ff Site
40. Location where coordination and execution of BCP or DRP is directed
Electronic Vaulting
Governance
Emergency Operations Center (EOC)
Labeling
41. Binary decision by a system of permitting or denying access to the entire system
Authentication
Deleted File
User
Rogue Access Points
42. Process of statistically testing a data set for the likelihood of relevant information.
Sampling
Enticement
Spyware
Tar Pits
43. To jump to a conclusion
Emergency Procedures
Inference
Legacy Data
Worldwide Interoperability for Microwave Access (WI-MAX )
44. Consume resources to a point of exhaustion - loss of availability
Denial Of Service
Alert
File
Physical Tampering
45. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Man-In-The-Middle Attack
Business Continuity Program
Kerberos
Integrated Test
46. A backup of data located where staff can gain access immediately
BCP Testing Drills and Exercises
Due Care
On-Site
Digital Certificate
47. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
IP Fragmentation
Shadowing (file shadowing)
Key Escrow
User Mode (problem or program state)
48. Tool which mediates access
Processes are Isolated By
UPS
Control
Encryption
49. Real-time - automatic and transparent backup of data.
Convincing
Radio Frequency Interference (RFI)
Remote Journaling
Codec
50. An image compression standard for photographs
Databases
Walk Though
JPEG (Joint Photographic Experts Group)
Electrostatic Discharge
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests