SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uncheck data input which results in redirection
Modification
HTTP Response Splitting
War Driving
Security Domain
2. The problems solving state - the opposite of supervisor mode
Patch Management
Notification
Operational
User Mode (problem or program state)
3. Eavesdropping on network communications by a third party.
War Dialing
Gateway
Tapping
Information Flow Model
4. Responsibility of a user for the actions taken by their account which requires unique identification
Analysis
Electromagnetic Interference (EMI)
Tactical
Accountability
5. Wrong against society
Spam
Criminal Law
Intrusion Prevention Systems
Non-Interference
6. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Deadlock
Recovery Time Objectives
Application Programming Interface
Rogue Access Points
7. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
TCSEC (Orange Book)
Declaration
Recovery
Containment
8. What is will remain - persistence
Steganography
Key Space
Durability
Orange Book A Classification
9. Guidelines within an organization that control the rules and configurations of an IDS
Residual Risk
Site Policy
Business Records
Labeling
10. Unsolicited advertising software
Adware
Digital Signature
Orange Book D Classification
Switches
11. A process state - to be either be unable to run waiting for an external event or terminated
Mission-Critical Application
Cryptography
System Downtime
Stopped
12. Employment education done once per position or at significant change of function
Worldwide Interoperability for Microwave Access (WI-MAX )
Damage Assessment
Structured Walkthrough
Job Training
13. A shield against leakage of electromagnetic signals.
Strong Authentication
Vital Record
Territoriality
Faraday Cage/ Shield
14. Information about data or records
Information Owner
True Attack Stimulus
Encryption
Metadata
15. Deals with discretionary protection
Business Continuity Planning (BCP)
Fraggle
Orange Book C Classification
Hub
16. Unchecked data which spills into another location in memory
Bollard
Buffer Overflow
TCSEC (Orange Book)
Patch Panels
17. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Wireless Fidelity (Wi-Fi )
Hash Function
Object
Information Risk Management (IRM)
18. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Checklist Test (desk check)
Instance
Simulation Test
Risk
19. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Emergency Procedures
Open Mail Relay Servers
Kernel
Tar Pits
20. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Checkpoint
Threat Agent
Reciprocal Agreement
MOM
21. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Residual Risk
Key Space
Computer Forensics
Emergency Procedures
22. An availability attack - to consume resources to the point of exhaustion
Denial Of Service
Call Tree
The ACID Test
Symmetric
23. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
File Sharing
Smurf
Integrated Test
Workaround Procedures
24. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Data Integrity
Administrative Laws
Examples of non-technical security components
Simulation Test
25. More than one process in the middle of executing at a time
Tracking
Race Condition
Residual Data
Multi-Tasking
26. A backup of data located where staff can gain access immediately
On-Site
Brouter
Multilevel Security System
Tar Pits
27. Property that data is represented in the same manner at all times
Consistency
Trusted Computing Base
Tactical
Alert/Alarm
28. OOP concept of an object's abilities - what it does
Concentrator
Alternate Site
Method
Packet Filtering
29. To reduce sudden rises in current
Surge Suppressor
Framework
Revocation
Multi-Party Control
30. A type a computer memory that temporarily stores frequently used information for quick access.
Cache
Database Replication
Admissible
Electronic Vaulting
31. To smooth out reductions or increases in power
Reciprocal Agreement
UPS
Firewall
Deterrent
32. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.
Cookie
Logic Bomb
Business Recovery Timeline
Watermarking
33. Written step-by-step actions
Change Control
Procedure
Standard
Encipher
34. Unauthorized wireless network access device.
Packet Filtering
Concentrator
Kernel
Rogue Access Points
35. With enough computing power trying all possible combinations
Interception
Fault
Brute Force
Bollard
36. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Decipher
CobiT
Digital Certificate
Authentic
37. Requirement of access to data for a clearly defined purpose
Total Risk
ISO/IEC 27001
Cross Training
Need-To-Know
38. Uses two or more legal systems
Job Rotation
Time Of Check/Time Of Use
Mixed Law System
Backup
39. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Business Impact Analysis
Malformed Input
Alert
Birthday Attack
40. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
File Extension
Noise
The ACID Test
Encipher
41. A risk assessment method - measurable real money cost
Quantitative
Algorithm
Firmware
Multi-Core
42. Control type- that is communication based - typically written or oral
Rollback
Notification
Administrative
Territoriality
43. A programming device use in development to circumvent controls
Education
Tracking
Trapdoors (Backdoors) (Maintenance Hooks)
ISO/IEC 27002
44. Process of statistically testing a data set for the likelihood of relevant information.
Civil Law
SQL Injection
Sampling
Phishing
45. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
User
Burn
Structured Walkthrough
Administrative Laws
46. Malware that makes small random changes to many data points
Recovery
Simulation Test
Revocation
Data Diddler
47. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Multi-Processing
Microwave
Containment
IP Fragmentation
48. To know more than one job
Cross Training
SYN Flooding
Simulation
Key Clustering
49. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Resumption
Examples of technical security components
Virus
Cryptography
50. Calculation encompassing threats - vulnerabilities and assets
Deadlock
Encryption
Repeaters
Total Risk
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests