SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A condition in which neither party is willing to stop their activity for the other to complete
Notification
Deadlock
Operational Test
Double Blind Testing
2. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Checklist Test
Electrostatic Discharge
Machine Language (Machine Code)
Disaster
3. Short period of low voltage.
Labeling
Polyalphabetic
Fiber Optics
Sag/Dip
4. Mitigate damage by isolating compromised systems from the network.
Durability
Object
Containment
Bumping
5. A description of a database
Qualitative
Tort
Data Dictionary
Mission-Critical Application
6. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Failure Modes and Effect Analysis (FEMA)
Data Recovery
Risk Mitigation
Least Privilege
7. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Exercise
Operational Test
Operating
Masked/Interruptible
8. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Computer Forensics
Burn
Call Tree
Botnet
9. Tool which mediates access
Countermeasure
Database Shadowing
Fire Suppression
Control
10. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Mixed Law System
Application Programming Interface
Waterfall
Tar Pits
11. System mediation of access with the focus on the context of the request
Fire Detection
Assembler
Content Dependent Access Control
File Sharing
12. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Elements of Negligence
Cross Training
Business Continuity Steering Committee
Object Oriented Programming (OOP)
13. Moving letters around
Backup
Permutation /Transposition
Remote Journaling
Consistency
14. Most granular organization of controls
Double Blind Testing
Digital Certificate
Threats
Control Category
15. Object based description of a system or a collection of resources
Metadata
Compression
Access Control Matrix
Packet Filtering
16. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Data Warehouse
Business Impact Analysis
Classification Scheme
Risk Mitigation
17. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Discretionary
Fraggle
Centralized Access Control Technologies
Alarm Filtering
18. A programming device use in development to circumvent controls
Conflict Of Interest
Trapdoors (Backdoors) (Maintenance Hooks)
Tar Pits
Distributed Processing
19. A back up type - where the organization has excess capacity in another location.
Change Control
Basics Of Secure Design
Distributed Processing
Privacy Laws
20. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Voice Over IP (VOIP)
Structured Walkthrough
Packet Filtering
Trojan Horse
21. Physical description on the exterior of an object that communicates the existence of a label
IP Address Spoofing
Processes are Isolated By
Quantitative
Marking
22. A hash that has been further encrypted with a symmetric algorithm
Least Privilege
Keyed-Hashing For Message Authentication
TCSEC (Orange Book)
Restoration
23. High frequency noise
Orange Book C2 Classification
Decipher
Disaster Recovery Plan
Electromagnetic Interference (EMI)
24. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.
Hearsay
Governance
Classification
Active Data
25. The technical and risk assesment of a system within the context of the operating environment
Blackout
Double Blind Testing
Certification
Analysis
26. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Legacy Data
Analysis
Security Kernel
Honeypot
28. A type a computer memory that temporarily stores frequently used information for quick access.
Cache
Modems
Triage
Enticement
29. People who interact with assets
Due Care
Evidence
Microwave
User
30. Control type- that is communication based - typically written or oral
Administrative
Open Mail Relay Servers
File Level Deletion
ff Site
31. To move from location to location - keeping the same function
Cross-Site Scripting
Job Rotation
Modification
Asymmetric
32. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Corrective
Slack Space
Exposure
Virus
33. Subjects will not interact with each other's objects
Emergency Procedures
Business Impact Assessment (BIA)
Crisis
Non-Interference
34. One of the key benefits of a network is the ability to share files stored on the server among several users.
Authorization
Running
File Sharing
Firewalls
35. More than one processor sharing same memory - also know as parallel systems
Initialization Vector
Near Site
Multi-Processor
Database Shadowing
36. Guidelines within an organization that control the rules and configurations of an IDS
Site Policy
Patch Management
Data Backups
Cold Site
37. Less granular organization of controls -
Instance
Control Type
Contact List
Access Control Attacks
38. Individuals and departments responsible for the storage and safeguarding of computerized data.
Data Custodian
Database Replication
Concentrator
Workaround Procedures
39. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Computer Forensics
Centralized Access Control Technologies
Tapping
Confidence Value
40. Written internalized or nationalized norms that are internal to an organization
Concentrator
Proprietary
Standard
Running Key
41. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
CobiT
Life Cycle of Evidence
Fiber Optics
Contingency Plan
42. Regular operations are stopped and where processing is moved to the alternate site.
Full-Interruption test
Blind Testing
Hot Site
Admissible
43. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Interception
Tracking
Injection
Discretionary Access Control (DAC)
44. Code breaking - practice of defeating the protective properties of cryptography.
Cryptanalysis
Burn
Administrative Law
2-Phase Commit
45. An attack involving the hijacking of a TCP session by predicting a sequence number.
Sequence Attacks
Policy
Site Policy
Electronic Vaulting
46. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Recovery Strategy
Binary
Archival Data
Injection
47. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Fragmented Data
Injection
Cookie
Spyware
48. A process state - to be executing a process on the CPU
Running
Data Owner
Hash Function
TCSEC (Orange Book)
49. Sudden rise in voltage in the power supply.
System Life Cycle
Surge
Structured Walk-Through Test
Control Category
50. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Worldwide Interoperability for Microwave Access (WI-MAX )
Least Privilege
Mission-Critical Application
Record Level Deletion
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests