SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Record of system activity - which provides for monitoring and detection.
Cryptology
Information Risk Management (IRM)
Log
Hard Disk
2. Those who initiate the attack
Worm
Object
Directive
Threat Agent
3. Asymmetric encryption of a hash of message
Digital Signature
Private Branch Exchange (PBX)
Supervisor Mode (monitor - system - privileged)
Kerberos
4. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Key Space
Record Level Deletion
Strong Authentication
Twisted Pair
5. Can be statistical (monitor behavior) or signature based (watch for known attacks)
Critical Infrastructure
Contingency Plan
Test Plan
IDS Intrusion Detection System
6. Act of scrambling the cleartext message by using a key.
CPU Cache
Encipher
Eavesdropping
Fire Detection
7. A process state - to be either be unable to run waiting for an external event or terminated
Recovery Point Objective (RPO)
Stopped
Access Control
Shift Cipher (Caesar)
8. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Countermeasure
Emergency
Threats
Transfer
9. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Plaintext
Uninterruptible Power Supply (UPS)
Discretionary Access Control (DAC)
Multi-Party Control
10. Malware that makes many small changes over time to a single data point or system
Call Tree
Forensic Copy
SYN Flooding
Salami
11. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Business Interruption Insurance
Civil Or Code Law
User
File Sharing
12. Recognition of an individual's assertion of identity.
Data Warehouse
Identification
Waterfall
Content Dependent Access Control
13. The study of cryptography and cryptanalysis
Conflict Of Interest
Examples of technical security components
Cryptology
Separation Of Duties
14. An individuals conduct that violates government laws developed to protect the public
Side Channel Attack
Data Dictionary
Strategic
Criminal Law
15. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
TEMPEST
ISO/IEC 27002
Packet Filtering
Site Policy Awareness
16. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Contact List
Contingency Plan
Business Interruption
Ethics
17. Something that happened
DR Or BC Coordinator
Enticement
Event
Phishing
18. The principles a person sets for themselves to follow
On-Site
User
DR Or BC Coordinator
Ethics
19. Communication of a security incident to stakeholders and data owners.
Surge
Notification
Memory Management
Aggregation
20. Dedicated fast memory located on the same board as the CPU
Asymmetric
Legacy Data
Residual Risk
CPU Cache
21. Uncleared buffers or media
Declaration
Job Training
Event
Object Reuse
22. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Attacker (Black hat - Hacker)
Application Programming Interface
Interception
Full Test (Full Interruption)
23. A description of a database
Waterfall
Data Dictionary
Information Flow Model
Service Bureau
24. Recovery alternative - short-term - high cost movable processing location
Redundant Array Of Independent Drives (RAID)
Complete
Mobile Site
Qualitative
25. Record history of incident
Tracking
Object Reuse
Architecture
Central Processing Unit (CPU)
26. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Fire Classes
Codec
Compartmentalize
Confidence Value
27. A trusted issuer of digital certificates
Initialization Vector
Certification Authority
Remote Access Trojan
Operating
28. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Test Plan
Site Policy Awareness
Change Control
Event
30. OOP concept of a taking attributes from the original or parent
Authorization
Cross Training
Full-Interruption test
Inheritance
31. One way encryption
Simulation Test
Attacker (Black hat - Hacker)
Safeguard
Hash Function
32. Only the key protects the encrypted information
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. Deals with discretionary protection
Exposure
Proxies
Orange Book C Classification
Multi-Processing
34. A test conducted on one or more components of a plan under actual operating conditions.
User
Eavesdropping
Operational Test
File
35. To segregate for the purposes of labeling
Supervisor Mode (monitor - system - privileged)
Spyware
Rollback
Compartmentalize
36. Subject based description of a system or a collection of resources
Firmware
Redundant Array Of Independent Drives (RAID)
Switches
Capability Tables
37. A technology that reduces the size of a file.
Contact List
Compensating
File
Compression
38. To load the first piece of software that starts a computer.
Boot (V.)
Business Interruption
Total Risk
Electronic Vaulting
39. Review of data
Analysis
Modems
Central Processing Unit (CPU)
Disaster
40. What is will remain - persistence
Inference
Durability
Asymmetric
Honeypot
41. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Threat Agent
Ethics
Assembler
Business Interruption
42. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Encipher
Risk Assessment
Recovery Period
Compression
43. Object based description of a single resource and the permission each subject
Electrostatic Discharge
Evidence
Access Control Lists
Critical Infrastructure
44. All of the protection mechanism in a computer system
Intrusion Detection Systems
Checkpoint
Sag/Dip
Trusted Computing Base
45. A programming design concept which abstracts one set of functions from another in a serialized fashion
Sharing
Race Condition
Layering
Computer Forensics
46. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Accountability
Call Tree
5 Rules Of Evidence
Initialization Vector
47. A program that waits for a condition or time to occur that executes an inappropriate activity
Metadata
Logic Bomb
Domain
Mandatory Access Control (MAC)
48. Unused storage capacity
Slack Space
Public Key Infrastructure (PKI)
Fiber Optics
Privacy Laws
49. A mobilized resource purchased or contracted for the purpose of business recovery.
Degauss
Acronym for American Standard Code for Information Interchange (ASCII)
Mobile Recovery
Marking
50. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Alarm Filtering
Accurate
Faraday Cage/ Shield
Boot (V.)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests