SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Asymmetric encryption of a hash of message
Intrusion Prevention Systems
Checklist Test (desk check)
Enticement
Digital Signature
2. Interception of a communication session by an attacker.
Satellite
Data Integrity
Hijacking
Detection
3. Recording activities at the keyboard level
Database Shadowing
Keystroke Logging
Multi-Processor
Shadowing (file shadowing)
4. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Data Owner
Message Digest
Tort
Computer Forensics
5. Deals with discretionary protection
Key Clustering
Locard's Principle
Orange Book C Classification
Alarm Filtering
6. Joining two pieces of text
TCSEC (Orange Book)
Key Management
Compartmentalize
Concatenation
7. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Multi-Processing
Business Recovery Timeline
Remote Journaling
Hard Disk
8. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Business Recovery Team
Twisted Pair
Architecture
Multi-Processing
9. Mitigation of system or component loss or interruption through use of backup capability.
Orange Book D Classification
Fault Tolerance
Algorithm
Activation
10. Prolonged loss of commercial power
Residual Data
Kernel
Information Technology Security Evaluation Criteria - ITSEC
Blackout
11. The core of a computer that calculates
Business Interruption Insurance
Analysis
Central Processing Unit (CPU)
Classification Scheme
12. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Mirrored Site
Orange Book C Classification
Business Unit Recovery
Parallel Test
13. A template for the designing the architecture
Radio Frequency Interference (RFI)
Multi-Programming
Alternate Data Streams (File System Forks)
Security Blueprint
14. Owner directed mediation of access
Botnet
Simulation
Malformed Input
Discretionary
15. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Deletion
Data Owner
Faraday Cage/ Shield
Internal Use Only
16. A running key using a random key that is never used again
Transfer
Business Recovery Team
One Time Pad
Remote Journaling
17. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Residual Data
TCSEC (Orange Book)
Tar Pits
Isolation
18. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Voice Over IP (VOIP)
Overlapping Fragment Attack
System Downtime
Mandatory Access Control (MAC)
19. A process state - to be executing a process on the CPU
Deadlock
Running
Confidence Value
Acronym for American Standard Code for Information Interchange (ASCII)
20. To know more than one job
Disaster Recovery Teams (Business Recovery Teams)
Cold Site
Teardrop
Cross Training
21. A program with an inappropriate second purpose
Trojan Horse
CPU Cache
Critical Infrastructure
Incident Response
22. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
UPS
The ACID Test
Business Recovery Timeline
Convincing
23. A protocol for the efficient transmission of voice over the Internet
Voice Over IP (VOIP)
Business Interruption
Coaxial Cable
EMI
24. A process state - to be either be unable to run waiting for an external event or terminated
Stopped
Algorithm
Fire Detection
Fire Suppression
25. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Emanations
Executive Succession
Business Records
Procedure
26. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Assembler
Burn
Disaster Recovery Teams (Business Recovery Teams)
Journaling
27. Record history of incident
Aggregation
Operational Impact Analysis
Domain
Tracking
28. Guidelines within an organization that control the rules and configurations of an IDS
Business Continuity Program
Site Policy
Injection
Inference
29. A form of data hiding which protects running threads of execution from using each other's memory
Process Isolation
SQL Injection
Cryptography
Fraggle
30. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Source Routing Exploitation
Fire Prevention
Incident Response
Polymorphism
31. The principles a person sets for themselves to follow
Tactical
Ethics
Common Law
False Attack Stimulus
32. An unintended communication path
Database Shadowing
Shadowing (file shadowing)
Compensating
Covert Channel
33. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Business Impact Analysis
File Level Deletion
Remote Access Trojan
Multilevel Security System
34. Is secondhand and usually not admissible in court
Assembler
Substitution
Hearsay Evidence
Guidelines
35. A process state - (blocked) needing input before continuing
Encapsulation
Interference (Noise)
Compiler
Wait
36. Highest level of authority at EOC with knowledge of the business process and the resources available
Incident Manager
Intrusion Prevention Systems
Message Digest
Accountability
37. Object reuse protection and auditing
Embedded Systems
Resumption
Architecture
Orange Book C2 Classification
38. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Phishing
Steganography
Log
Elements of Negligence
39. An alert or alarm that is triggered when no actual attack has taken place
False (False Positive)
Convincing
Primary Storage
Encryption
40. A hash that has been further encrypted with a symmetric algorithm
Keyed-Hashing For Message Authentication
Residual Risk
Checklist Test
Supervisor Mode (monitor - system - privileged)
41. To stop damage from spreading
Access Point
3 Types of harm Addressed in computer crime laws
Business Impact Analysis
Containment
42. An availability attack - to consume resources to the point of exhaustion
Public Key Infrastructure (PKI)
On-Site
Denial Of Service
Waterfall
43. Some systems are actually run at the alternate site
Parallel Test
Critical Infrastructure
War Driving
False Negative
44. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Key Space
Security Clearance
Business Impact Analysis
Shielding
45. Mitigate damage by isolating compromised systems from the network.
Containment
Control Type
Brute Force
Civil Or Code Law
46. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Concentrator
Redundant Array Of Independent Drives (RAID)
Worldwide Interoperability for Microwave Access (WI-MAX )
Directive
47. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Authorization
Moore's Law
Investigation
Call Tree
48. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Monitor
Firewalls
Running Key
3 Types of harm Addressed in computer crime laws
49. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. Impossibility of denying authenticity and identity
Non-Repudiation
Mission-Critical Application
Framework
Coaxial Cable
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests