SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Identification and notification of an unauthorized and/or undesired action
Accurate
Legacy Data
Polymorphism
Detection
2. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Control Category
Incident Response
Chain Of Custody
Object
3. Summary of a communication for the purpose of integrity
Message Digest
Common Law
Common Criteria
Radio Frequency Interference (RFI)
4. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Structured Walkthrough
Relocation
Basics Of Secure Design
Tar Pits
5. Interception of a communication session by an attacker.
Parallel Test
Hijacking
Intrusion Prevention Systems
Classification Scheme
6. Power surge
Electrostatic Discharge
Recovery Period
Site Policy
Fiber Optics
7. Induces a crime - tricks a person - and is illegal
Vulnerability
Trademark
Multi-Core
Entrapment
8. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Tar Pits
Disaster Recovery Plan
Smurf
Machine Language (Machine Code)
9. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).
Residual Risk
Fault
Concentrator
Surge
10. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Generator
Life Cycle of Evidence
Risk Assessment / Analysis
Key Escrow
11. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
The ACID Test
Information Risk Management (IRM)
Denial Of Service
Evidence
12. Tool which mediates access
UPS
Hard Disk
Control
TNI (Red Book)
13. Renders the file inaccessible to the operating system - available to reuse for data storage.
File Level Deletion
Triage
Copyright
Keyed-Hashing For Message Authentication
14. High level design or model with a goal of consistency - integrity - and balance
Enticement
Patch Panels
Exposure
Architecture
15. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Mobile Recovery
Satellite
2-Phase Commit
Triage
16. Uncheck data input which results in redirection
Mitigate
HTTP Response Splitting
Kernel
Time Of Check/Time Of Use
17. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Business Continuity Planning (BCP)
Security Blueprint
3 Types of harm Addressed in computer crime laws
Open Mail Relay Servers
18. Unchecked data which spills into another location in memory
Hot Site
Mirroring
Buffer Overflow
Primary Storage
19. A risk assessment method - measurable real money cost
Quantitative
Pointer
Distributed Denial Of Service
Worm
20. The core of a computer that calculates
Kerberos
Central Processing Unit (CPU)
Remote Access Trojan
Cryptography
21. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. Pertaining to law - lending it self to one side of an argument
Algorithm
Cross Training
Rogue Access Points
Convincing
23. Return to a normal state
TIFF (Tagged Image File Format)
Recovery
Assembler
TNI (Red Book)
24. Effort/time needed to overcome a protective measure
Patent
Embedded Systems
False (False Positive)
Work Factor
25. Record of system activity - which provides for monitoring and detection.
Non-Discretionary Access Control
Log
Contingency Plan
Plain Text
26. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
TNI (Red Book)
Hearsay
Key Management
Business Records
27. A design methodology which addresses risk early and often
Encryption
Fire Prevention
File
Spiral
28. Firewalls - encryption - and access control lists
Computer System Evidence
Examples of technical security components
Service Bureau
Internal Use Only
29. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Mantrap (Double Door System)
File Shadowing
Convincing
Operational Exercise
30. Unauthorized access of network devices.
Physical Tampering
Electrostatic Discharge
Incident Manager
Relocation
31. Fault tolerance for power
Contingency Plan
Shadowing (file shadowing)
Admissible
Generator
32. Try a list of words in passwords or encryption keys
Dictionary Attack
Job Rotation
Data Custodian
Keyed-Hashing For Message Authentication
33. Sudden rise in voltage in the power supply.
Surge
Data Backups
Collisions
Mirroring
34. A device that provides the functions of both a bridge and a router.
Brouter
Firmware
Cryptology
Non-Repudiation
35. A failure of an IDS to detect an actual attack
Trapdoors (Backdoors) (Maintenance Hooks)
Multi-Core
Non-Repudiation
False Negative
36. Total number of keys available that may be selected by the user of a cryptosystem
Site Policy
Convincing
Key Space
Full-Interruption test
37. A subnetwork with storage devices servicing all servers on the attached network.
File Server
TCSEC (Orange Book)
Storage Area Network (SAN)
Identification
38. A signal suggesting a system has been or is being attacked.
Alert/Alarm
Residual Risk
Key Clustering
Logic Bomb
39. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Private Branch Exchange (PBX)
Embedded
Mandatory Access Control (MAC)
Accurate
40. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Administrative Law
TCSEC (Orange Book)
Debriefing/Feedback
Hot Site
41. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Public Key Infrastructure (PKI)
Quantitative Risk Analysis
Routers
Highly Confidential
42. Renders the record inaccessible to the database management system
Record Level Deletion
Procedure
Operating
Shift Cipher (Caesar)
43. Planning with a goal of returning to the normal business function
Relocation
Procedure
Restoration
Initialization Vector
44. Evidence must be: admissible - authentic - complete - accurate - and convincing
Threads
Worm
5 Rules Of Evidence
Keystroke Logging
45. Inappropriate data
Malformed Input
IDS Intrusion Detection System
Fire Prevention
Cryptology
46. Information about data or records
Simulation
Access Control Lists
Multiplexers
Metadata
47. System mediation of access with the focus on the context of the request
Wait
Distributed Processing
Content Dependent Access Control
Information Flow Model
48. A condition in which neither party is willing to stop their activity for the other to complete
Code
Database Shadowing
Tactical
Deadlock
49. To segregate for the purposes of labeling
Detective
Compartmentalize
Data Leakage
Standalone Test
50. What is will remain - persistence
Layering
Electrostatic Discharge
Durability
Targeted Testing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests