SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A layer 3 device that used to connect two or more network segments and regulate traffic.
Process Isolation
Routers
Remote Journaling
Total Risk
2. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Hot Site
Examples of non-technical security components
Business Unit Recovery
Source Routing Exploitation
3. A layer 2 device that used to connect two or more network segments and regulate traffic.
Durability
Switches
Trusted Computing Base
Need-To-Know
4. A trusted issuer of digital certificates
Quantitative Risk Analysis
Data Recovery
Certification Authority
Waterfall
5. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Compression
Restoration
Redundant Servers
Recovery
6. Control type- that is communication based - typically written or oral
Binary
Governance
Durability
Administrative
7. People protect their domain
CPU Cache
Territoriality
Kerberos
War Driving
8. Amount of time for restoring a business process or function to normal operations without major loss
Maximum Tolerable Downtime (MTD)
File Sharing
Mirrored Site
Identification
9. Impossibility of denying authenticity and identity
Discretionary Access Control (DAC)
Non-Repudiation
File Level Deletion
Blackout
10. Subject based description of a system or a collection of resources
Emergency Operations Center (EOC)
Incident Response
Full-Interruption test
Capability Tables
11. One way encryption
Trojan Horse
Backup
Hash Function
Mandatory
12. Unsolicited commercial email
Byte
Spam
Forward Recovery
Digital Signature
13. Long term knowledge building
Public Key Infrastructure (PKI)
Disaster Recovery Plan
Education
Content Dependent Access Control
14. Recording activities at the keyboard level
Disaster
Keystroke Logging
Compiler
Exercise
15. Policy or stated actions
Due Care
Surveillance
Architecture
Vulnerability
16. High degree of visual control
Active Data
Archival Data
Surveillance
MOM
17. Using small special tools all tumblers of the lock are aligned - opening the door
Proxies
Intrusion Prevention Systems
Convincing
Picking
18. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Masquerading
Permutation /Transposition
Common Law
Embedded
19. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Security Blueprint
Source Routing Exploitation
Fire Classes
Patch Panels
20. The level and label given to an individual for the purpose of compartmentalization
Business Recovery Team
Simulation
Security Clearance
Alert
21. Descrambling the encrypted message with the corresponding key
Lattice
Transfer
Decipher
Data Dictionary
22. Disruption of operation of an electronic device due to a competing electromagnetic field.
Incident Response
Emergency Operations Center (EOC)
Due Diligence
EMI
23. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.
Application Programming Interface
Orange Book B2 Classification
Total Risk
Computer System Evidence
24. Eavesdropping on network communications by a third party.
Recovery
Proxies
Disk Mirroring
Sniffing
25. Hardware or software that is part of a larger system
Embedded
Business Recovery Team
Byte
Checkpoint
26. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Durability
Remote Journaling
Log
Forward Recovery
27. Converts a high level language into machine language
File Level Deletion
Object Reuse
Operational Exercise
Assembler
28. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Kerberos
Hard Disk
Desk Check Test
Risk Mitigation
29. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Sequence Attacks
Multi-Processing
Mandatory
Network Attached Storage (NAS)
30. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
SYN Flooding
Fault
Non-Discretionary Access Control
File
31. An administrative unit or a group of objects and subjects controlled by one reference monitor
Relocation
ff Site
Business Recovery Team
Security Domain
32. Substitution at the word or phrase level
Code
MOM
Content Dependent Access Control
Asymmetric
33. Intermediate level - pertaining to planning
System Downtime
Operational Test
Non-Repudiation
Operational
34. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Triage
Computer Forensics
Proprietary
Database Shadowing
35. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Security Clearance
Cryptovariable
Smurf
Storage Area Network (SAN)
37. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Digital Signature
Threats
Residual Risk
Privacy Laws
38. Third party processes used to organize the implementation of an architecture
Key Management
File Level Deletion
Framework
Database Shadowing
39. A design methodology which addresses risk early and often
Executive Succession
Contingency Plan
Spiral
Residual Data
40. To set the clearance of a subject or the classification of an object
Injection
Access Control Attacks
Labeling
Blackout
41. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Adware
Simulation Test
Multilevel Security System
Civil Law
42. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Critical Records
System Downtime
Incident Response
Man-In-The-Middle Attack
43. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Digital Certificate
Steganography
CobiT
Multi-Core
44. Reduces causes of fire
Process Isolation
Total Risk
Debriefing/Feedback
Fire Prevention
45. Communication of a security incident to stakeholders and data owners.
Site Policy
Key Management
Certification Authority
Notification
46. Most granular organization of controls
Patch Panels
Database Shadowing
Control Category
Service Bureau
47. A control after attack
Denial Of Service
MOM
Certification
Countermeasure
48. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Virtual Memory
Acronym for American Standard Code for Information Interchange (ASCII)
Residual Risk
Vital Record
49. To create a copy of data as a precaution against the loss or damage of the original data.
Mirrored Site
Forward Recovery
Backup
Archival Data
50. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Data Dictionary
Keyed-Hashing For Message Authentication
Standalone Test
Embedded Systems
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests