SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Control category- to discourage an adversary from attempting to access
Total Risk
Deterrent
Business Recovery Timeline
Activation
2. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Source Routing Exploitation
True Attack Stimulus
Incident Response Team
TEMPEST
3. Communicate to stakeholders
Orange Book B1 Classification
Site Policy
Debriefing/Feedback
Non-Repudiation
4. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Tapping
Overlapping Fragment Attack
Routers
Computer System Evidence
5. To assert or claim credentialing to an authentication system
Processes are Isolated By
Identification
Smurf
Checklist Test
6. Malware that subverts the detective controls of an operating system
Remote Journaling
Operating
Exposure
Rootkit
7. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Spiral
Man-In-The-Middle Attack
Metadata
Common Law
8. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
TNI (Red Book)
DR Or BC Coordinator
Uninterruptible Power Supply (UPS)
Acronym for American Standard Code for Information Interchange (ASCII)
9. To evaluate the current situation and make basic decisions as to what to do
IP Fragmentation
Triage
Memory Management
Failure Modes and Effect Analysis (FEMA)
10. Controls for logging and alerting
Intrusion Detection Systems
Incident Manager
Containment
Data Backup Strategies
11. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Residual Risk
Privacy Laws
Moore's Law
Administrative Access Controls
12. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Sharing
Business Continuity Steering Committee
Simulation
Contact List
13. A protocol for the efficient transmission of voice over the Internet
MOM
Voice Over IP (VOIP)
False Negative
Degauss
14. Low level - pertaining to planning
Ring Protection
Tactical
Operating
Hijacking
15. Two different keys decrypt the same cipher text
Salami
Top Secret
Confidence Value
Key Clustering
16. Mitigate damage by isolating compromised systems from the network.
Authentication
Containment
Incident Handling
Orange Book C Classification
17. A type a computer memory that temporarily stores frequently used information for quick access.
Multi-Processor
Recovery Period
User Mode (problem or program state)
Cache
18. The guardian of asset(s) - a maintenance activity
Application Programming Interface
Centralized Access Control Technologies
ff Site
Custodian
19. Wrong against society
Criminal Law
Structured Walkthrough
Application Programming Interface
Risk Assessment / Analysis
20. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Central Processing Unit (CPU)
Structured Walk-Through Test
Radio Frequency Interference (RFI)
Orange Book D Classification
21. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Business Continuity Program
Discretionary
Fault Tolerance
Least Privilege
22. Organized group of compromised computers
Botnet
Corrective
Control
Identification
23. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Business Recovery Timeline
Alert
Test Plan
Byte
24. Tool which mediates access
Denial Of Service
Control
Collisions
Countermeasure
25. Controls for termination of attempt to access object
Cross Certification
Degauss
Territoriality
Intrusion Prevention Systems
26. Intellectual property protection for the expression of an idea
Burn
Governance
Copyright
Emergency Procedures
27. Summary of a communication for the purpose of integrity
Radio Frequency Interference (RFI)
Discretionary
Message Digest
Conflict Of Interest
28. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
Fire Detection
Patent
Assembler
29. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
War Driving
Content Dependent Access Control
JPEG (Joint Photographic Experts Group)
Full Test (Full Interruption)
30. All of the protection mechanism in a computer system
Change Control
Trusted Computing Base
Side Channel Attack
SYN Flooding
31. Dedicated fast memory located on the same board as the CPU
Firewalls
Top Secret
CPU Cache
Fragmented Data
32. Substitution at the word or phrase level
Basics Of Secure Design
Fiber Optics
Incident Handling
Code
33. A device that provides the functions of both a bridge and a router.
Distributed Processing
Detection
Brouter
MOM
34. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
IP Fragmentation
Phishing
Uninterruptible Power Supply (UPS)
Alert
35. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Open Mail Relay Servers
Authentic
Resumption
Risk Assessment / Analysis
36. Recovery alternative - everything needed for the business function - except people and last backup
Authentic
Maximum Tolerable Downtime (MTD)
Hot Site
Revocation
37. High level design or model with a goal of consistency - integrity - and balance
Checkpoint
Data Backups
Architecture
Data Hiding
38. System directed mediation of access with labels
Mandatory
Inference
Virus
Faraday Cage/ Shield
39. Specific format of technical and physical controls that support the chosen framework and the architecture
Infrastructure
Fragmented Data
Job Rotation
Transfer
40. A collection of data or information that has a name
Confidence Value
Blind Testing
File
Data Backups
41. Long term knowledge building
Assembler
Encipher
Education
SQL Injection
42. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Interpreter
Shadowing (file shadowing)
2-Phase Commit
Recovery Strategy
43. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Common Law
Data Backup Strategies
Due Care
Privacy Laws
44. Evidence must be: admissible - authentic - complete - accurate - and convincing
E-Mail Spoofing
Revocation
5 Rules Of Evidence
Data Owner
45. Weakness or flaw in an asset
Supervisor Mode (monitor - system - privileged)
Vulnerability
Event
Alternate Site
46. To segregate for the purposes of labeling
Compartmentalize
Spam
Classification Scheme
Data Marts
47. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Top Secret
Guidelines
Coaxial Cable
Smurf
48. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Active Data
Information Risk Management (IRM)
Incident Manager
Disaster Recovery Plan
49. Power surge
Trusted Computing Base
Electrostatic Discharge
Accreditation
Data Owner
50. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Archival Data
Compartmentalize
Workaround Procedures
Trojan Horse
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests