SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Power surge
Business Records
Source Routing Exploitation
Electrostatic Discharge
Content Dependent Access Control
2. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Satellite
Checklist Test
Machine Language (Machine Code)
Network Attached Storage (NAS)
3. Initial surge of current
Sharing
Full Test (Full Interruption)
Inrush Current
Decipher
4. Recovery alternative which includes cold site and some equipment and infrastructure is available
Threats
Non-Interference
Warm Site
False Attack Stimulus
5. Firewalls - encryption - and access control lists
User
Structured Walkthrough
Examples of technical security components
Compensating
6. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Firewall
System Downtime
Confidence Value
TCSEC (Orange Book)
7. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Burn
Compartmentalize
Security Clearance
Bit
8. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Virtual Memory
Administrative Access Controls
Distributed Processing
Multi-Programming
9. The first rating that requires security labels
Data Integrity
Trademark
Orange Book B1 Classification
Operating
10. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Source Routing Exploitation
Discretionary
ISO/IEC 27002
Hub
11. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Chain of Custody
Exercise
Workaround Procedures
12. Objects or programming that looks the different but act same
Contingency Plan
Secondary Storage
Polymorphism
Smurf
13. Part of a transaction control for a database which informs the database of the last recorded transaction
Recovery Point Objective (RPO)
Primary Storage
Checkpoint
Orange Book B2 Classification
14. A distributed system's transaction control that requires updates to complete or rollback
Disk Mirroring
Education
Inheritance
2-Phase Commit
15. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Resumption
Boot (V.)
Business Continuity Planning (BCP)
Data Leakage
16. Memory - RAM
Side Channel Attack
Wireless Fidelity (Wi-Fi )
Procedure
Primary Storage
17. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
One Time Pad
Worldwide Interoperability for Microwave Access (WI-MAX )
Restoration
Parallel Test
18. High level - pertaining to planning
Strategic
One Time Pad
Debriefing/Feedback
Cookie
19. Intellectual property protection for an invention
Concatenation
Patent
Administrative Law
Recovery Strategy
20. Organized group of compromised computers
Life Cycle of Evidence
Botnet
Cross Certification
Substitution
21. Potential danger to information or systems
Pointer
Isolation
Threats
Multi-Core
22. A disturbance that degrades performance of electronic devices and electronic communications.
CPU Cache
Logic Bomb
Uninterruptible Power Supply (UPS)
Radio Frequency Interference (RFI)
23. Malware that makes many small changes over time to a single data point or system
Business Records
False Negative
Secondary Storage
Salami
24. A subnetwork with storage devices servicing all servers on the attached network.
Storage Area Network (SAN)
Disaster
Patch Management
Electronic Vaulting
25. A Trojan horse with the express underlying purpose of controlling host from a distance
Entrapment
Due Care
Remote Access Trojan
Life Cycle of Evidence
26. Substitution at the word or phrase level
Polyalphabetic
SQL Injection
Code
Emergency
27. Momentary loss of power
Security Kernel
User
Fault
Open Mail Relay Servers
28. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Containment
Collisions
Degauss
Critical Functions
29. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Pointer
Emergency Procedures
Data Marts
Encryption
30. A software design technique for abstraction of a process
Data Hiding
Mobile Site
Evidence
Examples of non-technical security components
31. Deals with discretionary protection
Recovery Point Objective (RPO)
3 Types of harm Addressed in computer crime laws
Physical Tampering
Orange Book C Classification
32. A condition in which neither party is willing to stop their activity for the other to complete
File Server
Data Dictionary
E-Mail Spoofing
Deadlock
33. Pertaining to law - lending it self to one side of an argument
Legacy Data
Executive Succession
BCP Testing Drills and Exercises
Convincing
34. Pertaining to law - verified as real
Microwave
Collisions
Electronic Vaulting
Authentic
35. Line noise that is superimposed on the supply circuit.
Object Oriented Programming (OOP)
Governance
High-Risk Areas
Transients
36. Prolonged loss of commercial power
Accountability
Operational Test
Blackout
Governance
37. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Restoration
Emergency
Standalone Test
Residual Data
38. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Cryptography
Off-Site Storage
Basics Of Secure Design
Alarm Filtering
39. One entity with two competing allegiances
Open Mail Relay Servers
Certificate Revocation List (CRL)
Access Control
Conflict Of Interest
40. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Trademark
User Mode (problem or program state)
Evidence
Process Isolation
41. Individuals and departments responsible for the storage and safeguarding of computerized data.
Total Risk
Hard Disk
Data Custodian
Botnet
42. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Certification Authority
Risk Assessment / Analysis
Risk Mitigation
Life Cycle of Evidence
43. Descrambling the encrypted message with the corresponding key
Change Control
Decipher
Masked/Interruptible
Cold Site
44. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
Microwave
Damage Assessment
Executive Succession
Disaster Recovery Teams (Business Recovery Teams)
45. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems
Fire Suppression
Crisis
Mobile Recovery
Acronym for American Standard Code for Information Interchange (ASCII)
46. More than one process in the middle of executing at a time
Administrative Law
Deleted File
Kerckhoff's Principle
Multi-Tasking
47. A collection of information designed to reduce duplication and increase integrity
True Attack Stimulus
Orange Book C Classification
Databases
Consistency
48. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. A collection of data or information that has a name
Steganography
Residual Risk
File
Private Branch Exchange (PBX)
50. Intellectual property protection for an confidential and critical process
Compiler
Compartmentalize
Trade Secret
Security Domain
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests