SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An alert or alarm that is triggered when no actual attack has taken place
Malformed Input
Hub
False (False Positive)
Orange Book B1 Classification
2. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Business Interruption Insurance
Deleted File
Critical Records
IP Address Spoofing
3. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Risk Mitigation
Compartmentalize
Reference Monitor
IP Fragmentation
4. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Bit
Packet Filtering
Mission-Critical Application
Cold Site
5. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Worm
Restoration
Fault Tolerance
Examples of technical security components
6. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Covert Channel
3 Types of harm Addressed in computer crime laws
Information Flow Model
Object
7. A collection of data or information that has a name
Data Dictionary
Integrated Test
File
Digital Signature
8. Evidence must be: admissible - authentic - complete - accurate - and convincing
Authorization
Targeted Testing
5 Rules Of Evidence
Orange Book B1 Classification
9. A program with an inappropriate second purpose
Incident Handling
TEMPEST
Architecture
Trojan Horse
10. Firewalls - encryption - and access control lists
Hearsay Evidence
Mandatory Vacations
Examples of technical security components
Mirrored Site
11. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Mirroring
Elements of Negligence
Fault Tolerance
Attacker (Black hat - Hacker)
12. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Repeaters
System Life Cycle
Ethics
Generator
13. The principles a person sets for themselves to follow
Spam
Ethics
Operating
Residual Risk
14. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Coaxial Cable
Machine Language (Machine Code)
Code
Modification
15. Wrong against society
Ethics
Log
Criminal Law
Masked/Interruptible
16. Provides a physical cross connect point for devices.
Centralized Access Control Technologies
ff Site
Change Control
Patch Panels
17. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Business Impact Assessment (BIA)
Chain Of Custody
Computer Forensics
5 Rules Of Evidence
18. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Modems
Residual Risk
Notification
Walk Though
19. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Blackout
Threat Agent
Integrated Test
Need-To-Know
20. A test conducted on one or more components of a plan under actual operating conditions.
Checklist Test
Operational Test
Information Technology Security Evaluation Criteria - ITSEC
The ACID Test
21. Induces a crime - tricks a person - and is illegal
Exercise
Memory Management
Entrapment
True Attack Stimulus
22. Total number of keys available that may be selected by the user of a cryptosystem
Remanence
Simulation Test
Key Space
Fire Detection
23. Weakness or flaw in an asset
Aggregation
Information Risk Management (IRM)
Digital Certificate
Vulnerability
24. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
File
ff Site
Monitor
TIFF (Tagged Image File Format)
25. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. To reduce sudden rises in current
Brouter
Surge Suppressor
Operational Impact Analysis
Open Mail Relay Servers
27. Tool which mediates access
Botnet
Concentrator
Control
Trapdoors (Backdoors) (Maintenance Hooks)
28. A protocol for the efficient transmission of voice over the Internet
Voice Over IP (VOIP)
Domain
Preemptive
Redundant Servers
29. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Residual Risk
Fire Classes
User Mode (problem or program state)
Honeynet
30. A system that enforces an access control policy between two networks.
Radio Frequency Interference (RFI)
Administrative
Firewalls
Orange Book C2 Classification
31. Review of data
Redundant Servers
Analysis
Interception
Work Factor
32. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Restoration
Basics Of Secure Design
Business Continuity Planning (BCP)
MOM
33. Converts a high level language into machine language
Method
Intrusion Detection Systems
Assembler
Remanence
34. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Journaling
Data Warehouse
Hub
Checklist Test (desk check)
35. The chance that something negative will occur
Replication
Risk
Access Control
Exercise
36. Control type- that is communication based - typically written or oral
Administrative
Spyware
Remanence
Forensic Copy
37. Object based description of a system or a collection of resources
Access Control Matrix
Spiral
Tapping
Hearsay Evidence
38. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Replication
Cross-Site Scripting
Tort
Copyright
39. Identification and notification of an unauthorized and/or undesired action
Computer System Evidence
Eavesdropping
Detection
Transients
40. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Access Control Lists
Byte Level Deletion
HTTP Response Splitting
MOM
41. A signal suggesting a system has been or is being attacked.
Alert/Alarm
Operational Exercise
Threat Agent
Plan Maintenance Procedures
42. Fault tolerance for power
Restoration
Threat Agent
Message Digest
Generator
43. Forgery of the sender's email address in an email header.
Labeling
Modems
Business Interruption Insurance
E-Mail Spoofing
44. Code breaking - practice of defeating the protective properties of cryptography.
Hot Spares
Classification Scheme
Cryptanalysis
Metadata
45. Planning with a goal of returning to the normal business function
Private Branch Exchange (PBX)
Teardrop
Restoration
Polyalphabetic
46. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Hacker
Embedded
Chain of Custody
Wait
47. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Object Oriented Programming (OOP)
Fragmented Data
Payload
Monitor
48. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Locard's Principle
Tar Pits
Mirroring
Side Channel Attack
49. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.
Information Technology Security Evaluation Criteria - ITSEC
HTTP Response Splitting
Modems
Emergency
50. Collection of data on business functions which determines the strategy of resiliency
Business Impact Assessment (BIA)
Fire Prevention
Complete
Denial Of Service
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests