SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A distributed system's transaction control that requires updates to complete or rollback
Embedded Systems
2-Phase Commit
Man-In-The-Middle Attack
Remote Journaling
2. A planned or unplanned interruption in system availability.
System Downtime
Criminal Law
HTTP Response Splitting
Public Key Infrastructure (PKI)
3. Recovery alternative - a building only with sufficient power - and HVAC
Cold Site
Brouter
Cryptography
Initialization Vector
4. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Full Test (Full Interruption)
Site Policy
Masked/Interruptible
Privacy Laws
5. The guardian of asset(s) - a maintenance activity
Custodian
Packet Filtering
5 Rules Of Evidence
Race Condition
6. To collect many small pieces of data
Logic Bomb
Aggregation
Multilevel Security System
Confidence Value
7. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Atomicity
Network Attached Storage (NAS)
Decipher
Common Law
8. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Structured Walk-Through Test
Security Kernel
Recovery Time Objectives
Fault
9. Control type- that is communication based - typically written or oral
Off-Site Storage
Revocation
Administrative
Quantitative
10. Evidence must be: admissible - authentic - complete - accurate - and convincing
Enticement
Sniffing
Dictionary Attack
5 Rules Of Evidence
11. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Criminal Law
Embedded
Multi-Programming
Data Leakage
12. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
System Life Cycle
Injection
High-Risk Areas
File Extension
13. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
CPU Cache
Byte Level Deletion
Countermeasure
Emergency
14. A trusted issuer of digital certificates
Certification Authority
Deleted File
Covert Channel
Custodian
15. An event which stops business from continuing.
Disaster
Contact List
System Life Cycle
Firewall
16. Memory management technique which allows data to be moved from one memory address to another
Surge Suppressor
Relocation
Key Escrow
Steganography
17. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Contingency Plan
Pervasive Computing and Mobile Computing Devices
Decipher
Administrative Access Controls
18. Malware that subverts the detective controls of an operating system
Residual Risk
Compartmentalize
Mirroring
Rootkit
19. A layer 2 device that used to connect two network segments and regulate traffic.
Bridge
Service Bureau
Botnet
File Sharing
20. OOP concept of a distinct copy of the class
Object
TIFF (Tagged Image File Format)
Orange Book C2 Classification
Risk
21. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Repeaters
Burn
Source Routing Exploitation
Administrative Access Controls
22. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Fraggle
Containment
False (False Positive)
Twisted Pair
23. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
User Mode (problem or program state)
Sharing
Off-Site Storage
Cross-Site Scripting
24. OOP concept of a taking attributes from the original or parent
Identification
Enticement
Damage Assessment
Inheritance
25. Specific format of technical and physical controls that support the chosen framework and the architecture
Metadata
Operational Impact Analysis
Infrastructure
Incident Handling
26. People who interact with assets
Chain of Custody
Worm
User
Electronic Vaulting
27. Pertaining to law - high degree of veracity
Asymmetric
Accurate
Slack Space
Kernel
28. Amount of time for restoring a business process or function to normal operations without major loss
Countermeasure
Residual Risk
Data Dictionary
Maximum Tolerable Downtime (MTD)
29. A choice in risk management - to implement a control that limits or lessens negative effects
Complete
Incident Response
Isolation
Mitigate
30. Regular operations are stopped and where processing is moved to the alternate site.
Full-Interruption test
Cross Training
Information Technology Security Evaluation Criteria - ITSEC
Journaling
31. A documented battle plan for coordinating response to incidents.
Mitigate
Incident Handling
Activation
Administrative Law
32. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Security Clearance
Revocation
Worldwide Interoperability for Microwave Access (WI-MAX )
Fire Detection
33. Potentially compromising leakage of electrical or acoustical signals.
Damage Assessment
Emanations
Digital Certificate
Electrostatic Discharge
34. To move from location to location - keeping the same function
Watermarking
Initialization Vector
Job Rotation
Degauss
35. Deals with discretionary protection
Orange Book C Classification
Technical Access Controls
Information Flow Model
Alert
36. Independent malware that requires user interaction to execute
Virus
Deterrent
HTTP Response Splitting
Bit
37. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Fire Suppression
Hot Spares
Top Secret
Tapping
38. Summary of a communication for the purpose of integrity
Message Digest
Marking
Electrostatic Discharge
Near Site
39. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Redundant Array Of Independent Drives (RAID)
Electromagnetic Interference (EMI)
Kerberos
Total Risk
40. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Cryptanalysis
Admissible
Critical Records
Warm Site
41. May be responsible for overall recovery of an organization or unit(s).
Spyware
DR Or BC Coordinator
Job Training
Running
42. Intellectual property protection for marketing efforts
Certification Authority
EMI
Virtual Memory
Trademark
43. Long term knowledge building
Birthday Attack
Fire Suppression
Business Interruption Insurance
Education
44. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.
Incident Manager
Recovery Strategy
TIFF (Tagged Image File Format)
Mirrored Site
45. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Sequence Attacks
Administrative Law
Contact List
Source Routing Exploitation
46. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
ff Site
Checkpoint
BCP Testing Drills and Exercises
Binary
47. The level and label given to an individual for the purpose of compartmentalization
Instance
Rollback
Process Isolation
Security Clearance
48. A type a computer memory that temporarily stores frequently used information for quick access.
Chain Of Custody
Reference Monitor
Cache
Kerberos
49. Transaction controls for a database - a return to a previous state
Reference Monitor
Recovery Strategy
Race Condition
Rollback
50. A process state - (blocked) needing input before continuing
Mobile Site
Wait
Forward Recovery
Multi-Core
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests