SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recording activities at the keyboard level
Data Custodian
Operational Exercise
Keystroke Logging
Boot (V.)
2. Potentially compromising leakage of electrical or acoustical signals.
Emanations
Permutation /Transposition
Vital Record
Framework
3. A device that provides the functions of both a bridge and a router.
Access Control Lists
Double Blind Testing
Mirroring
Brouter
4. For PKI - to have more than one person in charge of a sensitive function
Security Domain
Multi-Party Control
Service Bureau
Rootkit
5. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Workaround Procedures
Access Control Lists
Privacy Laws
ITSEC
6. A template for the designing the architecture
Risk Assessment
Security Blueprint
Security Clearance
Journaling
7. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Primary Storage
Active Data
Assembler
Residual Risk
8. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Archival Data
Data Backup Strategies
Off-Site Storage
Degauss
9. Intellectual property protection for the expression of an idea
Picking
Fragmented Data
Honeynet
Copyright
10. An unintended communication path
Covert Channel
Threats
Triage
Pervasive Computing and Mobile Computing Devices
11. Momentary loss of power
Fault
Collisions
Tar Pits
Alert/Alarm
12. Uses two or more legal systems
Reference Monitor
Vulnerability
Blackout
Mixed Law System
13. Inference about encrypted communications
Data Backups
Shift Cipher (Caesar)
Side Channel Attack
Mobile Recovery
14. To break a business process into separate functions and assign to different people
Vital Record
IDS Intrusion Detection System
Separation Of Duties
Running Key
15. A process state - to be either be unable to run waiting for an external event or terminated
Key Management
Targeted Testing
Stopped
Hearsay Evidence
16. An individuals conduct that violates government laws developed to protect the public
Privacy Laws
Message Digest
Birthday Attack
Criminal Law
17. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Database Shadowing
Archival Data
Orange Book D Classification
Forward Recovery
18. Regular operations are stopped and where processing is moved to the alternate site.
Compensating
Processes are Isolated By
Full-Interruption test
Hub
19. System directed mediation of access with labels
Accurate
Data Dictionary
Quantitative Risk Analysis
Mandatory
20. Evidence must be: admissible - authentic - complete - accurate - and convincing
5 Rules Of Evidence
Electrostatic Discharge
Investigation
Data Integrity
21. A failure of an IDS to detect an actual attack
False Negative
Civil Or Code Law
Mobile Recovery
Application Programming Interface
22. Pertaining to law - no omissions
Complete
Hijacking
Data Backups
Business Continuity Steering Committee
23. A covert storage channel on the file attribute
Alternate Data Streams (File System Forks)
Degauss
Orange Book C Classification
Safeguard
24. A device that sequentially switches multiple analog inputs to the output.
Watermarking
Multiplexers
Activation
Brouter
25. An alert or alarm that is triggered when no actual attack has taken place
False (False Positive)
Restoration
Slack Space
Private Branch Exchange (PBX)
26. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
State Machine Model
Civil Or Code Law
Picking
Overlapping Fragment Attack
27. Granular decision by a system of permitting or denying access to a particular resource on the system
Gateway
Assembler
Authorization
Overlapping Fragment Attack
28. Converts source code to an executable
Operational Exercise
Spyware
Alternate Data Streams (File System Forks)
Compiler
29. Requirement of access to data for a clearly defined purpose
Need-To-Know
Life Cycle of Evidence
Metadata
Switches
30. Threats x Vulnerability x Asset Value = Total Risk
Risk Assessment / Analysis
Data Owner
Side Channel Attack
Total Risk
31. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Alternate Site
Metadata
Phishing
Operational Exercise
32. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Total Risk
Fault
Contingency Plan
E-Mail Spoofing
33. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Event
Virtual Memory
Substitution
Corrective
34. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Analysis
Rollback
Exercise
Civil Law
35. A mathematical tool for verifying no unintentional changes have been made
Checksum
Digital Certificate
Restoration
Code
36. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Redundant Servers
Cache
Multi-Processor
Tar Pits
37. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Alert
Mirroring
Bollard
Mitigate
38. Information about a particular data set
Metadata
Checkpoint
Authentication
Inheritance
39. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Critical Records
Criminal Law
Eavesdropping
Logic Bomb
40. Data or interference that can trigger a false positive
Checklist Test
Discretionary
Symmetric
Noise
41. Controls for logging and alerting
Intrusion Detection Systems
Keyed-Hashing For Message Authentication
Locard's Principle
Resumption
42. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Disaster Recovery Plan
Databases
Simulation Test
Business Recovery Timeline
43. The first rating that requires security labels
Protection
Orange Book B1 Classification
Site Policy Awareness
Threats
44. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Object Reuse
Infrastructure
Legacy Data
3 Types of harm Addressed in computer crime laws
45. More than one processor sharing same memory - also know as parallel systems
Virus
Multi-Processor
TEMPEST
Orange Book B1 Classification
46. Total number of keys available that may be selected by the user of a cryptosystem
Analysis
Key Space
Digital Certificate
Object Oriented Programming (OOP)
47. OOP concept of a distinct copy of the class
Object
Mobile Recovery
Redundant Servers
Substitution
48. Sphere of influence
Double Blind Testing
Domain
Archival Data
Byte
49. Object reuse protection and auditing
Event
Orange Book C2 Classification
Pointer
Exposure
50. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests