SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security policy - procedures - and compliance enforcement
False Negative
Examples of non-technical security components
Control Category
Encapsulation
2. Maximum tolerance for loss of certain business function - basis of strategy
Recovery Time Objectives
Emergency
Asymmetric
DR Or BC Coordinator
3. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
File Shadowing
Due Care
Bumping
Data Backup Strategies
4. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Incident Response
Critical Records
Deterrent
Interference (Noise)
5. Those who initiate the attack
Threat Agent
Simulation Test
Cryptography
Key Management
6. Define the way in which the organization operates.
Dictionary Attack
Recovery Strategy
Trojan Horse
Proprietary
7. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
E-Mail Spoofing
Twisted Pair
Stopped
Fiber Optics
8. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Risk
Coaxial Cable
TEMPEST
Residual Risk
9. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Dictionary Attack
Mandatory Access Control (MAC)
Recovery
Crisis
10. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
High-Risk Areas
Residual Risk
Critical Records
Packet Filtering
11. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Strong Authentication
Embedded Systems
Stopped
Strategic
12. The managerial approval to operate a system based upon knowledge of risk to operate
Trusted Computing Base
Accreditation
Tapping
Protection
13. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Critical Functions
Targeted Testing
State Machine Model
Double Blind Testing
14. Eavesdropping on network communications by a third party.
Surveillance
Sniffing
Information Technology Security Evaluation Criteria - ITSEC
Disaster Recovery Tape
15. Recording the Who What When Where How of evidence
Concatenation
Control
Chain Of Custody
Bridge
16. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Fire Prevention
Full Test (Full Interruption)
Critical Infrastructure
Distributed Denial Of Service
17. Uncheck data input which results in redirection
Classification Scheme
HTTP Response Splitting
Lattice
Prevention
18. Narrow scope examination of a system
Business Recovery Timeline
Targeted Testing
Running
Compression
19. Mitigate damage by isolating compromised systems from the network.
Discretionary
Containment
Source Routing Exploitation
EMI
20. Memory management technique which allows subjects to use the same resource
Data Hiding
Common Law
User Mode (problem or program state)
Sharing
21. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Mitigate
Key Clustering
Business Unit Recovery
Disk Mirroring
22. A distributed system's transaction control that requires updates to complete or rollback
Legacy Data
Emergency Operations Center (EOC)
2-Phase Commit
Triage
23. Uses two or more legal systems
Orange Book D Classification
Remote Journaling
Mixed Law System
Non-Discretionary Access Control
24. State of computer - to be running a process
CobiT
Examples of non-technical security components
Operating
Access Point
25. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Active Data
Critical Records
Critical Infrastructure
Microwave
26. A backup type - for databases at a point in time
Encryption
Access Control
Shadowing (file shadowing)
Storage Area Network (SAN)
27. Third party processes used to organize the implementation of an architecture
Business Recovery Team
Framework
Alarm Filtering
Certification Authority
28. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Modification
Work Factor
Hub
Trade Secret
29. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
Separation Of Duties
Data Warehouse
Incident Response Team
30. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Test Plan
Checklist Test
Transients
Operating
31. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Data Backups
Data Marts
Disaster Recovery Tape
Site Policy
32. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Time Of Check/Time Of Use
Access Control
Trusted Computing Base
Hard Disk
33. Organized group of compromised computers
E-Mail Spoofing
Alert/Alarm
ITSEC
Botnet
34. OOP concept of a taking attributes from the original or parent
Governance
Key Management
Inheritance
Assembler
35. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.
Safeguard
Risk Assessment / Analysis
Data Dictionary
Marking
36. To stop damage from spreading
Containment
Private Branch Exchange (PBX)
Emergency Procedures
Running Key
37. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Initialization Vector
Vital Record
Administrative Laws
Governance
38. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Distributed Denial Of Service
Private Branch Exchange (PBX)
Database Replication
Desk Check Test
39. Short period of low voltage.
Durability
Substitution
Sag/Dip
Alternate Data Streams (File System Forks)
40. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Key Space
Analysis
Information Risk Management (IRM)
Risk Assessment / Analysis
41. Code making
Cryptography
False Negative
Contingency Plan
Worm
42. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Civil Law
Protection
Running Key
Disk Mirroring
43. Indivisible - data field must contain only one value that either all transactions take place or none do
Atomicity
Denial Of Service
Deletion
2-Phase Commit
44. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Contingency Plan
Key Space
Sequence Attacks
Tar Pits
45. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Remote Access Trojan
Application Programming Interface
Disk Mirroring
Kerckhoff's Principle
46. OOP concept of a distinct copy of the class
Mandatory Vacations
Twisted Pair
Masquerading
Object
47. People protect their domain
Rootkit
Territoriality
Recovery
Integrated Test
48. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Initialization Vector
Cookie
Checklist Test (desk check)
Job Training
49. A programming design concept which abstracts one set of functions from another in a serialized fashion
Residual Risk
Layering
Mantrap (Double Door System)
True Attack Stimulus
50. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Memory Management
Brouter
Off-Site Storage
Shift Cipher (Caesar)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests