SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Fault Tolerance
Record Level Deletion
File Server
Cryptovariable
2. Evidence must be: admissible - authentic - complete - accurate - and convincing
5 Rules Of Evidence
Routers
Mandatory Access Control (MAC)
Gateway
3. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Access Control Lists
Orange Book B2 Classification
Risk
Recovery Point Objective (RPO)
4. The technical and risk assesment of a system within the context of the operating environment
Fire Suppression
Certification
Gateway
Corrective
5. The core logic engine of an operating system which almost never changes
Acronym for American Standard Code for Information Interchange (ASCII)
Kernel
Conflict Of Interest
EMI
6. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
IP Address Spoofing
Class
Standalone Test
Log
7. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Redundant Servers
Failure Modes and Effect Analysis (FEMA)
CobiT
Business Continuity Program
8. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Business Continuity Program
Vital Record
Confidence Value
Non-Discretionary Access Control
9. Business and technical process of applying security software updates in a regulated periodic way
Metadata
User
Ethics
Patch Management
10. Malware that makes many small changes over time to a single data point or system
Patent
Salami
Asymmetric
Record Level Deletion
11. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Disaster Recovery Teams (Business Recovery Teams)
Executive Succession
Enticement
Administrative
12. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Secondary Storage
Fire Classes
Instance
Accountability
13. Measures followed to restore critical functions following a security incident.
Redundant Servers
Recovery
Faraday Cage/ Shield
DR Or BC Coordinator
14. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Test Plan
Denial Of Service
Trojan Horse
Concentrator
15. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Mandatory Access Control (MAC)
ISO/IEC 27002
Business Impact Assessment (BIA)
Maximum Tolerable Downtime (MTD)
16. One way encryption
Directive
Running
Hash Function
5 Rules Of Evidence
17. Vehicle stopping object
False Negative
Bollard
HTTP Response Splitting
Liability
18. A documented battle plan for coordinating response to incidents.
Targeted Testing
Recovery
Incident Handling
Key Management
19. A computer designed for the purpose of studying adversaries
Cross Certification
Vital Record
Honeypot
Buffer Overflow
20. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Emanations
Locard's Principle
Proxies
Picking
21. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Faraday Cage/ Shield
Encryption
Threats
Redundant Servers
22. System of law based upon what is good for society
Decipher
Civil Or Code Law
Structured Walk-Through Test
Network Attached Storage (NAS)
23. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Overlapping Fragment Attack
BCP Testing Drills and Exercises
File Extension
Hub
24. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Remote Journaling
Disaster Recovery Teams (Business Recovery Teams)
Life Cycle of Evidence
Lattice
25. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Twisted Pair
Durability
IP Address Spoofing
TCSEC (Orange Book)
26. To load the first piece of software that starts a computer.
Boot (V.)
Computer Forensics
Classification
Restoration
27. Alerts personnel to the presence of a fire
Stopped
Fire Detection
Education
Consistency
28. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Incident Handling
Discretionary Access Control (DAC)
Databases
Repeaters
29. Define the way in which the organization operates.
Proprietary
Critical Functions
Kerberos
HTTP Response Splitting
30. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Tracking
Coaxial Cable
Masked/Interruptible
Degauss
31. An event which stops business from continuing.
Wireless Fidelity (Wi-Fi )
Disaster
Concentrator
Non-Interference
32. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Access Control Attacks
Virtual Memory
Denial Of Service
IP Fragmentation
33. Line noise that is superimposed on the supply circuit.
Teardrop
Coaxial Cable
Forensic Copy
Transients
34. Scrambled form of the message or data
Cipher Text
Administrative Access Controls
Checksum
Codec
35. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Common Law
Failure Modes and Effect Analysis (FEMA)
Electrostatic Discharge
Durability
36. Induces a crime - tricks a person - and is illegal
Deleted File
Application Programming Interface
Entrapment
Authentic
37. Intellectual property protection for an confidential and critical process
DR Or BC Coordinator
Standalone Test
Trade Secret
Multi-Party Control
38. Data or interference that can trigger a false positive
Noise
Life Cycle of Evidence
Multiplexers
Switches
39. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
System Downtime
Full Test (Full Interruption)
Containment
Worldwide Interoperability for Microwave Access (WI-MAX )
40. Threats x Vulnerability x Asset Value = Total Risk
Total Risk
Incident Response Team
Centralized Access Control Technologies
Encapsulation
41. An unintended communication path
Covert Channel
Disaster Recovery Tape
File Sharing
Checksum
42. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Operational Exercise
Strong Authentication
Desk Check Test
Denial Of Service
43. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
Security Kernel
Adware
Substitution
Incident Response
44. Try a list of words in passwords or encryption keys
Brouter
Kerberos
Dictionary Attack
Trapdoors (Backdoors) (Maintenance Hooks)
45. A backup of data located where staff can gain access immediately
File Shadowing
Central Processing Unit (CPU)
On-Site
Kerberos
46. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.
Checklist Test
Examples of non-technical security components
Alert
Wireless Fidelity (Wi-Fi )
47. Transaction controls for a database - a return to a previous state
Separation Of Duties
CPU Cache
Rollback
Redundant Servers
48. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Operational Test
Ethics
Disaster Recovery Tape
Remote Access Trojan
49. Recovery alternative - everything needed for the business function - except people and last backup
Overlapping Fragment Attack
Algorithm
Locard's Principle
Hot Site
50. Intermediate level - pertaining to planning
Reference Monitor
Job Training
Operational
Patent
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests