SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can be statistical (monitor behavior) or signature based (watch for known attacks)
Standalone Test
Compartmentalize
Classification
IDS Intrusion Detection System
2. A type a computer memory that temporarily stores frequently used information for quick access.
Private Branch Exchange (PBX)
Cache
Trojan Horse
Detective
3. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Corrective
Memory Management
Threats
Disaster
4. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Non-Discretionary Access Control
Privacy Laws
Durability
Distributed Processing
5. Eavesdropping on network communications by a third party.
Alarm Filtering
Relocation
Sniffing
Investigation
6. Calculation encompassing threats - vulnerabilities and assets
Cold Site
Encipher
Race Condition
Total Risk
7. More than one CPU on a single board
Threats
Multi-Core
Worldwide Interoperability for Microwave Access (WI-MAX )
Tort
8. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Security Domain
Processes are Isolated By
Examples of technical security components
Confidence Value
9. Eavesdropping on network communications by a third party.
Highly Confidential
Emergency Procedures
Tapping
Legacy Data
10. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Tar Pits
Source Routing Exploitation
Buffer Overflow
Plan Maintenance Procedures
11. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Trojan Horse
Fault
Brute Force
Integrated Test
12. Deals with discretionary protection
Orange Book C Classification
Sampling
Targeted Testing
Integrated Test
13. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
MOM
Journaling
Common Criteria
Burn
14. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Administrative Access Controls
Hash Function
Interception
Primary Storage
15. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Near Site
Intrusion Prevention Systems
Mitigate
Administrative Laws
16. Disruption of operation of an electronic device due to a competing electromagnetic field.
Disaster Recovery Tape
Embedded
EMI
Parallel Test
17. Vehicle stopping object
Control Category
Data Owner
Bollard
Brute Force
18. Communicate to stakeholders
Digital Certificate
Debriefing/Feedback
Fire Detection
Hard Disk
19. Unsolicited commercial email
Cache
Off-Site Storage
Spam
System Life Cycle
20. Requirement of access to data for a clearly defined purpose
Deletion
User Mode (problem or program state)
Packet Filtering
Need-To-Know
21. A passive network attack involving monitoring of traffic.
Alert/Alarm
Life Cycle of Evidence
File Level Deletion
Eavesdropping
22. Transaction controls for a database - a return to a previous state
Rollback
Trademark
Business Unit Recovery
Evidence
23. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Recovery Period
Embedded Systems
Recovery Strategy
ISO/IEC 27001
24. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Recovery
Uninterruptible Power Supply (UPS)
Business Recovery Timeline
Education
25. Asymmetric encryption of a hash of message
Worldwide Interoperability for Microwave Access (WI-MAX )
Containment
Digital Signature
Information Risk Management (IRM)
26. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Emergency
Backup
Multilevel Security System
Data Custodian
27. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Business Recovery Timeline
Network Attached Storage (NAS)
Kernel
Information Technology Security Evaluation Criteria - ITSEC
28. Intellectual property protection for an confidential and critical process
Investigation
Trade Secret
Disaster Recovery Teams (Business Recovery Teams)
Business Impact Analysis
29. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
False Attack Stimulus
Resumption
Threats
Business Interruption
30. More than one processor sharing same memory - also know as parallel systems
False Negative
State Machine Model
Class
Multi-Processor
31. What is will remain - persistence
Chain of Custody
Rogue Access Points
Durability
Maximum Tolerable Downtime (MTD)
32. Mitigate damage by isolating compromised systems from the network.
Containment
Capability Tables
Entrapment
Checklist Test (desk check)
33. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Masquerading
Brute Force
Civil Law
Information Flow Model
34. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Emergency
Cold Site
Radio Frequency Interference (RFI)
Kerberos
35. A backup type which creates a complete copy
Revocation
Microwave
Replication
Routers
36. Evaluation of a system without prior knowledge by the tester
Symmetric
Blind Testing
Total Risk
Information Technology Security Evaluation Criteria - ITSEC
37. A one way - directed graph which indicates confidentiality or integrity flow
SQL Injection
Critical Functions
Lattice
Electrostatic Discharge
38. A test conducted on one or more components of a plan under actual operating conditions.
Log
Radio Frequency Interference (RFI)
Conflict Of Interest
Operational Test
39. More than one process in the middle of executing at a time
Sag/Dip
Multi-Tasking
Log
Process Isolation
40. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Disk Mirroring
Bridge
Rollback
Smurf
41. Weakness or flaw in an asset
Evidence
Vulnerability
Emergency Operations Center (EOC)
Desk Check Test
42. Reduces causes of fire
Codec
Incident
Due Diligence
Fire Prevention
43. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Alert
User
Vital Record
Denial Of Service
44. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Proprietary
Alternate Site
Rogue Access Points
Exposure
45. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Electromagnetic Interference (EMI)
Boot (V.)
Fiber Optics
Acronym for American Standard Code for Information Interchange (ASCII)
46. Intermediate level - pertaining to planning
Framework
Classification
Business Impact Assessment (BIA)
Operational
47. Guidelines within an organization that control the rules and configurations of an IDS
Evidence
Operational Impact Analysis
Site Policy
Plaintext
48. Someone who wants to cause harm
Electronic Vaulting
Attacker (Black hat - Hacker)
Fault Tolerance
Due Care
49. One entity with two competing allegiances
Tar Pits
Data Diddler
Multi-Party Control
Conflict Of Interest
50. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Alert
Hub
Application Programming Interface
Dangling Pointer
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests