SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Sharing
Encryption
Access Control Matrix
Exposure
2. Firewalls - encryption - and access control lists
Remote Journaling
Tracking
Examples of technical security components
Critical Records
3. Small data files written to a user's hard drive by a web server.
Shielding
Cookie
Fire Detection
Degauss
4. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Business Records
Redundant Array Of Independent Drives (RAID)
ISO/IEC 27001
Failure Modes and Effect Analysis (FEMA)
5. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Mission-Critical Application
Business Unit Recovery
Cross-Site Scripting
IDS Intrusion Detection System
6. Intellectual property protection for the expression of an idea
Copyright
Side Channel Attack
Business Recovery Timeline
Source Routing Exploitation
7. High frequency noise
High-Risk Areas
Firmware
Hash Function
Electromagnetic Interference (EMI)
8. A unit of execution
Vital Record
Threads
Infrastructure
Interpreter
9. A backup of data located where staff can gain access immediately
Multi-Tasking
Sharing
On-Site
Due Diligence
10. Written suggestions that direct choice to a few alternatives
Aggregation
Governance
Guidelines
User Mode (problem or program state)
11. The connection between a wireless and wired network.
Access Point
Criminal Law
Governance
Event
12. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
System Life Cycle
Tapping
2-Phase Commit
Civil Or Code Law
13. To jump to a conclusion
Inference
Directive
Declaration
Data Integrity
14. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Reference Monitor
Threats
Threat Agent
Checklist Test
15. Property that data is represented in the same manner at all times
Polyalphabetic
Plain Text
Consistency
Permutation /Transposition
16. Scrambled form of the message or data
Compiler
Virtual Memory
Cipher Text
Emergency Procedures
17. A documented battle plan for coordinating response to incidents.
Firmware
Byte
Compartmentalize
Incident Handling
18. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Burn
Infrastructure
Incident Response
Patch Management
19. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
High-Risk Areas
Pervasive Computing and Mobile Computing Devices
Access Control Lists
Memory Management
20. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Concatenation
Business Interruption
Data Backups
Risk Mitigation
21. A choice in risk management - to convince another to assume risk - typically by payment
Protection
Transfer
Honeypot
Network Attached Storage (NAS)
22. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Logic Bomb
Locard's Principle
User
Pointer
23. Intellectual property protection for an confidential and critical process
Faraday Cage/ Shield
Trade Secret
High-Risk Areas
TIFF (Tagged Image File Format)
24. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Business Continuity Steering Committee
Vital Record
Remanence
Generator
25. Memory management technique which allows subjects to use the same resource
Central Processing Unit (CPU)
Inrush Current
Sharing
Payload
26. Mathematical function that determines the cryptographic operations
Access Control Lists
Algorithm
Crisis
Technical Access Controls
27. Planning with a goal of returning to the normal business function
Message Digest
Decipher
Restoration
Risk Assessment
28. Claiming another's identity at a physical level
Masquerading
Infrastructure
Voice Over IP (VOIP)
Key Management
29. One entity with two competing allegiances
Contact List
Conflict Of Interest
Full Test (Full Interruption)
Radio Frequency Interference (RFI)
30. Wrong against society
Accreditation
Databases
Modems
Criminal Law
31. Unchecked data which spills into another location in memory
Custodian
Incident
Buffer Overflow
Risk Mitigation
32. To know more than one job
Aggregation
Cross Training
Object Reuse
Buffer Overflow
33. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Concentrator
Proxies
Forensic Copy
Security Domain
34. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Operating
Walk Though
Access Control Attacks
Desk Check Test
35. A passive network attack involving monitoring of traffic.
Eavesdropping
Patch Management
Mandatory Vacations
Covert Channel
36. Object based description of a system or a collection of resources
Contingency Plan
Kerberos
Access Control Matrix
Journaling
37. System mediation of access with the focus on the context of the request
Simulation Test
Quantitative
Proprietary
Content Dependent Access Control
38. For PKI - to store another copy of a key
Key Escrow
Pervasive Computing and Mobile Computing Devices
Security Kernel
High-Risk Areas
39. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Admissible
State Machine Model
Satellite
Exercise
40. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Accurate
Monitor
Forward Recovery
Risk Assessment / Analysis
41. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Administrative Laws
Man-In-The-Middle Attack
IP Fragmentation
Trapdoors (Backdoors) (Maintenance Hooks)
42. Provides a physical cross connect point for devices.
Patch Panels
Plan Maintenance Procedures
Application Programming Interface
Least Privilege
43. System directed mediation of access with labels
Mandatory
Conflict Of Interest
UPS
Hot Site
44. Uncheck data input which results in redirection
Admissible
HTTP Response Splitting
Prevention
Hard Disk
45. Reduction of voltage by the utility company for a prolonged period of time
Brownout
File
Rogue Access Points
Network Attached Storage (NAS)
46. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. To move from location to location - keeping the same function
Deterrent
Job Rotation
Desk Check Test
Access Control Matrix
48. Location where coordination and execution of BCP or DRP is directed
Emergency Operations Center (EOC)
Test Plan
Open Mail Relay Servers
Tactical
49. A Denial of Service attack that floods the target system with connection requests that are not finalized.
SYN Flooding
Byte
Guidelines
Due Care
50. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Watermarking
High-Risk Areas
Access Point
Data Backup Strategies
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests