SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Searching for wireless networks in a moving car.
Crisis
Patch Management
File Extension
War Driving
2. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Redundant Servers
Modification
Uninterruptible Power Supply (UPS)
Faraday Cage/ Shield
3. Natural occurrence in circuits that are in close proximity
EMI
Interference (Noise)
Authentication
Ethics
4. Unsolicited commercial email
Spam
Critical Infrastructure
Exercise
SQL Injection
5. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Due Diligence
Wireless Fidelity (Wi-Fi )
Public Key Infrastructure (PKI)
Cache
6. A template for the designing the architecture
Countermeasure
Business Impact Analysis
Security Blueprint
Recovery Point Objective (RPO)
7. Uses two or more legal systems
User Mode (problem or program state)
Wireless Fidelity (Wi-Fi )
Mixed Law System
Strategic
8. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Quantitative
Secondary Storage
Orange Book B2 Classification
Public Key Infrastructure (PKI)
9. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Remanence
Phishing
Redundant Servers
Remote Journaling
10. Return to a normal state
Contact List
Remote Access Trojan
Recovery
Orange Book A Classification
11. Uncleared buffers or media
Object Reuse
ITSEC
ISO/IEC 27002
Examples of non-technical security components
12. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Data Diddler
Information Risk Management (IRM)
Picking
MOM
13. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Forensic Copy
Uninterruptible Power Supply (UPS)
TCSEC (Orange Book)
Overlapping Fragment Attack
14. Pertaining to law - high degree of veracity
Honeypot
Operational Impact Analysis
Accurate
Vulnerability
15. Real-time data backup ( Data Mirroring)
Monitor
Compiler
Database Shadowing
Analysis
16. Hardware or software that is part of a larger system
Alarm Filtering
Embedded
Plain Text
Business Continuity Steering Committee
17. OOP concept of an object at runtime
Instance
Process Isolation
Electrostatic Discharge
Business Continuity Steering Committee
18. Maximum tolerance for loss of certain business function - basis of strategy
Recovery Time Objectives
Forward Recovery
Data Dictionary
Contingency Plan
19. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.
Containment
User
Risk Mitigation
Trojan Horse
20. Potentially compromising leakage of electrical or acoustical signals.
Chain of Custody
Data Leakage
Key Space
Emanations
21. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Business Records
Reference Monitor
Embedded
Key Clustering
22. A unit of execution
Collisions
Threads
User Mode (problem or program state)
Firmware
23. Pertaining to law - accepted by a court
Threads
Repeaters
Code
Admissible
24. DoS - Spoofing - dictionary - brute force - wardialing
Access Control Attacks
Shielding
Intrusion Detection Systems
Examples of technical security components
25. A design methodology which addresses risk early and often
Dictionary Attack
Spiral
Uninterruptible Power Supply (UPS)
Brute Force
26. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Orange Book B1 Classification
CobiT
Masquerading
Operational Impact Analysis
27. Controls for termination of attempt to access object
Intrusion Prevention Systems
Procedure
5 Rules Of Evidence
Access Point
28. Subset of operating systems components dedicated to protection mechanisms
Risk Assessment
Security Kernel
Safeguard
Security Clearance
29. Forging of an IP address.
Inrush Current
Administrative
IP Address Spoofing
Embedded
30. Abstract and mathematical in nature - defining all possible states - transitions and operations
Analysis
On-Site
Trojan Horse
State Machine Model
31. Control category - more than one control on a single asset
Assembler
Botnet
Incident Response
Compensating
32. To load the first piece of software that starts a computer.
War Driving
Parallel Test
Boot (V.)
Administrative Laws
33. Narrow scope examination of a system
Authentic
Recovery
Targeted Testing
Phishing
34. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Injection
Substitution
Databases
Intrusion Prevention Systems
35. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Change Control
Business Interruption
Desk Check Test
Mandatory Access Control (MAC)
36. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Information Technology Security Evaluation Criteria - ITSEC
Multi-Core
Certification Authority
Multi-Tasking
37. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
UPS
Backup
Wait
Coaxial Cable
38. Evidence must be: admissible - authentic - complete - accurate - and convincing
5 Rules Of Evidence
Proprietary
TIFF (Tagged Image File Format)
Declaration
39. An encryption method that has a key as long as the message
Identification
Labeling
Time Of Check/Time Of Use
Running Key
40. A world-wide wireless technology
Rootkit
Risk Assessment
Data Leakage
Wireless Fidelity (Wi-Fi )
41. A backup type which creates a complete copy
Replication
CPU Cache
Liability
Running Key
42. Program that inappropriately collects private data or activity
On-Site
Prevention
Spyware
Operational Impact Analysis
43. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
File Sharing
Payload
Secondary Storage
Virtual Memory
44. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Man-In-The-Middle Attack
Business Records
Restoration
Open Mail Relay Servers
45. Initial surge of current
Record Level Deletion
Denial Of Service
Inrush Current
Compression
46. Lower frequency noise
Structured Walkthrough
Residual Risk
Radio Frequency Interference (RFI)
Prevention
47. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Electronic Vaulting
Masquerading
Hash Function
Disaster Recovery Tape
48. A control before attack
Mobile Recovery
Databases
Standalone Test
Safeguard
49. Malware that makes small random changes to many data points
Civil Law
Kerberos
Mobile Recovery
Data Diddler
50. Some systems are actually run at the alternate site
Instance
Infrastructure
Orange Book B2 Classification
Parallel Test
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests