SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Return to a normal state
Algorithm
Moore's Law
Denial Of Service
Recovery
2. A set of laws that the organization agrees to be bound by
Reciprocal Agreement
Structured Walkthrough
Administrative Law
Classification Scheme
3. Individuals and departments responsible for the storage and safeguarding of computerized data.
Data Custodian
Failure Modes and Effect Analysis (FEMA)
Noise
Distributed Denial Of Service
4. The connection between a wireless and wired network.
Examples of non-technical security components
Access Point
Simulation Test
TIFF (Tagged Image File Format)
5. A layer 2 device that used to connect two or more network segments and regulate traffic.
Switches
Modification
Electrostatic Discharge
Brouter
6. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Interception
Initialization Vector
Brownout
On-Site
7. Mathematical function that determines the cryptographic operations
Residual Risk
Algorithm
Relocation
5 Rules Of Evidence
8. Moving the alphabet intact a certain number spaces
Shift Cipher (Caesar)
Procedure
Inrush Current
Object
9. Trading one for another
Log
Directive
Spyware
Substitution
10. Pertaining to law - verified as real
Authentic
Trapdoors (Backdoors) (Maintenance Hooks)
Byte Level Deletion
False (False Positive)
11. Intellectual property protection for the expression of an idea
Kerberos
War Driving
Copyright
Stopped
12. Intellectual property protection for an invention
Class
Patent
ff Site
Business Recovery Timeline
13. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Brouter
Classification Scheme
Computer Forensics
Access Control Attacks
14. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Network Attached Storage (NAS)
Cryptanalysis
Cross Certification
Distributed Denial Of Service
15. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Least Privilege
Database Shadowing
Network Attached Storage (NAS)
Civil Law
16. Potential danger to information or systems
Threats
Physical Tampering
Dangling Pointer
Slack Space
17. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Checklist Test
Basics Of Secure Design
Full Test (Full Interruption)
SQL Injection
18. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Remote Journaling
Data Leakage
Plan Maintenance Procedures
ISO/IEC 27001
19. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Quantitative Risk Analysis
Security Blueprint
Business Continuity Planning (BCP)
Disk Mirroring
20. OOP concept of a taking attributes from the original or parent
Accountability
Inheritance
5 Rules Of Evidence
Central Processing Unit (CPU)
21. Memory - RAM
TNI (Red Book)
Primary Storage
Kernel
Orange Book B1 Classification
22. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Hearsay Evidence
Electromagnetic Interference (EMI)
Uninterruptible Power Supply (UPS)
Debriefing/Feedback
23. Requirement to take time off
Near Site
Picking
Emanations
Mandatory Vacations
24. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Honeypot
Kerckhoff's Principle
Hub
E-Mail Spoofing
25. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Recovery Point Objective (RPO)
Business Recovery Team
Criminal Law
Hot Site
26. Outputs within a given function are the same result
Convincing
Bit
Collisions
Targeted Testing
27. Intellectual property protection for marketing efforts
Alert
Cryptography
Trademark
Business Impact Analysis
28. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Active Data
Activation
Blackout
Smurf
29. Potentially retrievable data residue that remains following intended erasure of data.
Fraggle
Fault
Remanence
Deleted File
30. High degree of visual control
Recovery Period
Surveillance
Durability
Metadata
31. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
War Dialing
Administrative
Detective
Object Reuse
32. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Instance
Incident Response
Classification
Fire Suppression
33. Property that data is represented in the same manner at all times
Crisis
Data Leakage
Consistency
JPEG (Joint Photographic Experts Group)
34. Intellectual property protection for an confidential and critical process
Fiber Optics
False (False Positive)
System Life Cycle
Trade Secret
35. Memory management technique which allows subjects to use the same resource
Business Unit Recovery
Restoration
Sharing
Orange Book D Classification
36. A computer designed for the purpose of studying adversaries
Honeypot
Consistency
Wireless Fidelity (Wi-Fi )
Logic Bomb
37. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Object Reuse
Distributed Processing
Restoration
Threats
38. Recording activities at the keyboard level
Critical Functions
Control
Keystroke Logging
Encapsulation
39. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Authorization
File Shadowing
Identification
Multilevel Security System
40. Subject based description of a system or a collection of resources
Contingency Plan
Capability Tables
Adware
Non-Repudiation
41. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Copyright
Dictionary Attack
Life Cycle of Evidence
Authentication
42. A description of a database
Data Dictionary
Moore's Law
Proprietary
Key Clustering
43. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Virtual Memory
Active Data
IDS Intrusion Detection System
Databases
44. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Multi-Party Control
Malformed Input
Internal Use Only
Race Condition
45. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Critical Records
Key Space
Classification Scheme
Control Type
46. Induces a crime - tricks a person - and is illegal
Salami
Entrapment
Exercise
Activation
47. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Resumption
Hub
Reference Monitor
Acronym for American Standard Code for Information Interchange (ASCII)
48. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Mixed Law System
Processes are Isolated By
Shielding
Corrective
49. Hardware or software that is part of a larger system
5 Rules Of Evidence
Mandatory
Embedded
Recovery Time Objectives
50. Written step-by-step actions
Procedure
File Sharing
Ring Protection
Firewall
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests