SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Steganography
Full Test (Full Interruption)
Worldwide Interoperability for Microwave Access (WI-MAX )
Fire Detection
2. Vehicle or tool that exploits a weakness
Enticement
Mission-Critical Application
Metadata
Threats
3. The problems solving state - the opposite of supervisor mode
Risk
User Mode (problem or program state)
File Extension
Databases
4. To set the clearance of a subject or the classification of an object
Radio Frequency Interference (RFI)
Information Flow Model
Labeling
Disk Mirroring
5. Joining two pieces of text
Identification
Noise
Concatenation
Surge Suppressor
6. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Archival Data
File Extension
Off-Site Storage
Spyware
7. Individuals and departments responsible for the storage and safeguarding of computerized data.
Data Custodian
CPU Cache
Hacker
Cross-Site Scripting
8. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Governance
Change Control
Crisis
Work Factor
9. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Lattice
3 Types of harm Addressed in computer crime laws
Information Technology Security Evaluation Criteria - ITSEC
Method
10. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Transients
EMI
Electronic Vaulting
Primary Storage
11. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Procedure
Hearsay Evidence
Technical Access Controls
Process Isolation
12. Unsolicited commercial email
Remote Journaling
Certificate Revocation List (CRL)
Inrush Current
Spam
13. Guidelines within an organization that control the rules and configurations of an IDS
JPEG (Joint Photographic Experts Group)
Site Policy
Transients
Rogue Access Points
14. Communicate to stakeholders
Examples of technical security components
Access Point
Debriefing/Feedback
Digital Signature
15. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Disaster Recovery Teams (Business Recovery Teams)
Access Control Lists
Forensic Copy
Alert
16. Momentary loss of power
Fault
Dictionary Attack
Smurf
Active Data
17. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Disaster Recovery Teams (Business Recovery Teams)
Remote Journaling
Bollard
Restoration
18. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Race Condition
Digital Signature
Evidence
SQL Injection
19. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Keystroke Logging
Walk Though
Mandatory
Criminal Law
20. Written step-by-step actions
Procedure
UPS
Disaster Recovery Teams (Business Recovery Teams)
Domain
21. Intellectual property protection for the expression of an idea
Cryptography
Emergency
Copyright
Steganography
22. Narrow scope examination of a system
Reciprocal Agreement
Targeted Testing
Eavesdropping
Rootkit
23. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Data Leakage
Governance
Concentrator
Identification
24. Real-time - automatic and transparent backup of data.
Surveillance
Remote Journaling
War Dialing
Process Isolation
25. Long term knowledge building
Threat Agent
Procedure
Education
ISO/IEC 27001
26. Deals with discretionary protection
Authentic
Orange Book C Classification
Trapdoors (Backdoors) (Maintenance Hooks)
IP Fragmentation
27. System directed mediation of access with labels
Substitution
Mandatory
Lattice
Active Data
28. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Common Law
Business Recovery Team
File Level Deletion
Emanations
29. Communication of a security incident to stakeholders and data owners.
Notification
Faraday Cage/ Shield
Binary
Data Diddler
30. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Malformed Input
Containment
Call Tree
Labeling
31. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Custodian
Multi-Programming
Residual Data
Safeguard
32. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Exposure
Reciprocal Agreement
2-Phase Commit
Structured Walkthrough
33. A process state - to be either be unable to run waiting for an external event or terminated
Copyright
Stopped
Business Impact Assessment (BIA)
Wireless Fidelity (Wi-Fi )
34. The connection between a wireless and wired network.
Control Category
Access Point
Computer Forensics
Storage Area Network (SAN)
35. Control category- to record an adversary's actions
Marking
Detective
Primary Storage
Critical Records
36. Creation distribution update and deletion
Gateway
Hot Spares
Event
Key Management
37. Malware that makes small random changes to many data points
Injection
Alert
Data Diddler
Mirroring
38. The event signaling an IDS to produce an alarm when no attack has taken place
False Attack Stimulus
Operational
Cross Certification
Centralized Access Control Technologies
39. Can be statistical (monitor behavior) or signature based (watch for known attacks)
Business Records
JPEG (Joint Photographic Experts Group)
IDS Intrusion Detection System
ITSEC
40. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
UPS
Plaintext
Locard's Principle
High-Risk Areas
41. For PKI - decertify an entities certificate
Checklist Test (desk check)
Revocation
Classification Scheme
Data Marts
42. Responsibility of a user for the actions taken by their account which requires unique identification
Instance
Incident Response Team
Business Continuity Planning (BCP)
Accountability
43. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Digital Signature
Full-Interruption test
Private Branch Exchange (PBX)
Orange Book B2 Classification
44. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Digital Signature
Admissible
File Level Deletion
Hot Spares
45. Independent malware that requires user interaction to execute
Cryptography
Virus
Top Secret
Metadata
46. A planned or unplanned interruption in system availability.
System Downtime
Smurf
Birthday Attack
Parallel Test
47. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Source Routing Exploitation
Mandatory
Vital Record
Infrastructure
48. Renders the file inaccessible to the operating system - available to reuse for data storage.
Bumping
Least Privilege
File Level Deletion
IDS Intrusion Detection System
49. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Quantitative Risk Analysis
Object
TEMPEST
Picking
50. Some systems are actually run at the alternate site
Threats
Classification
False Attack Stimulus
Parallel Test
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests