SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recovery alternative which includes cold site and some equipment and infrastructure is available
Salami
Alternate Data Streams (File System Forks)
Warm Site
Authentic
2. Unused storage capacity
Computer Forensics
Slack Space
Consistency
Redundant Servers
3. A program that waits for a condition or time to occur that executes an inappropriate activity
Spiral
Access Control Lists
Logic Bomb
Job Training
4. Just enough access to do the job
Change Control
Least Privilege
Surveillance
CPU Cache
5. A collection of data or information that has a name
File
Risk
Worldwide Interoperability for Microwave Access (WI-MAX )
Tar Pits
6. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm
Virus
ff Site
Routers
Source Routing Exploitation
7. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Containment
Residual Risk
Blind Testing
Watermarking
8. Controls deployed to avert unauthorized and/or undesired actions.
Checklist Test (desk check)
Prevention
Network Attached Storage (NAS)
Injection
9. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Smurf
SQL Injection
Vulnerability
Trade Secret
10. Control category- to record an adversary's actions
Detective
Computer System Evidence
Threats
Interception
11. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Fire Classes
Operational
Fiber Optics
Damage Assessment
12. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Cryptanalysis
Electronic Vaulting
Deleted File
Classification Scheme
13. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.
Civil Law
ISO/IEC 27001
Fragmented Data
Strategic
14. Threats x Vulnerability x Asset Value = Total Risk
Restoration
Total Risk
Plaintext
Modems
15. Object based description of a system or a collection of resources
Wireless Fidelity (Wi-Fi )
Authorization
Access Control Matrix
Call Tree
16. Information about data or records
Multilevel Security System
Metadata
Tracking
Private Branch Exchange (PBX)
17. Granular decision by a system of permitting or denying access to a particular resource on the system
Encipher
Authorization
War Dialing
System Downtime
18. Recovery alternative which outsources a business function at a cost
Pointer
Parallel Test
Territoriality
Service Bureau
19. Asymmetric encryption of a hash of message
War Driving
Patch Management
Digital Signature
Access Control
20. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Cryptology
ISO/IEC 27001
Hearsay
Deadlock
21. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Electromagnetic Interference (EMI)
Containment
Information Technology Security Evaluation Criteria - ITSEC
Cold Site
22. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Complete
Legacy Data
Ethics
Binary
23. A disturbance that degrades performance of electronic devices and electronic communications.
Salami
Qualitative
Inrush Current
Radio Frequency Interference (RFI)
24. An encryption method that has a key as long as the message
Exposure
Running Key
Teardrop
Need-To-Know
25. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Phishing
Method
Access Control
Faraday Cage/ Shield
26. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Countermeasure
Intrusion Prevention Systems
Fiber Optics
Archival Data
27. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Business Continuity Planning (BCP)
Data Owner
Plan Maintenance Procedures
Access Control
28. Scrambled form of the message or data
Cross Certification
Substitution
Cipher Text
Business Continuity Program
29. Initial surge of current
Residual Data
Inrush Current
Maximum Tolerable Downtime (MTD)
Database Replication
30. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Orange Book A Classification
Honeynet
Recovery Period
Picking
31. A form of data hiding which protects running threads of execution from using each other's memory
Revocation
Process Isolation
Payload
Covert Channel
32. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Mock Disaster
Alarm Filtering
Certification Authority
Walk Though
33. Claiming another's identity at a physical level
Masquerading
Key Management
Operating
Application Programming Interface
34. Lower frequency noise
Common Law
Cross Training
Radio Frequency Interference (RFI)
Waterfall
35. A choice in risk management - to implement a control that limits or lessens negative effects
Slack Space
Mitigate
Emergency Procedures
Inheritance
36. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
TNI (Red Book)
Brownout
ISO/IEC 27001
Vital Record
37. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Encryption
Fragmented Data
Fiber Optics
Embedded Systems
38. Total number of keys available that may be selected by the user of a cryptosystem
Key Space
Non-Interference
Domain
Polyalphabetic
39. Natural or human-readable form of message
Plain Text
Hearsay
Intrusion Prevention Systems
SQL Injection
40. Owner directed mediation of access
Need-To-Know
Atomicity
Mandatory
Discretionary
41. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Honeypot
Aggregation
Critical Infrastructure
IP Fragmentation
42. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Life Cycle of Evidence
Cache
Forensic Copy
Data Diddler
43. High degree of visual control
Chain of Custody
Surveillance
Birthday Attack
Orange Book C Classification
44. Measures followed to restore critical functions following a security incident.
Architecture
Recovery
Operational
Faraday Cage/ Shield
45. Control category - more than one control on a single asset
Compensating
Structured Walk-Through Test
Redundant Servers
Key Escrow
46. To jump to a conclusion
Encapsulation
Moore's Law
Interference (Noise)
Inference
47. Eavesdropping on network communications by a third party.
Threat Agent
Tapping
Conflict Of Interest
Intrusion Detection Systems
48. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Storage Area Network (SAN)
Overlapping Fragment Attack
Mirrored Site
Patent
49. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
Computer Forensics
Packet Filtering
Centralized Access Control Technologies
50. Reduction of voltage by the utility company for a prolonged period of time
Mantrap (Double Door System)
Non-Repudiation
Multi-Tasking
Brownout
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests