SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Intellectual property protection for marketing efforts
Remanence
Polymorphism
Recovery Strategy
Trademark
2. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Brouter
Data Owner
Accreditation
Emanations
3. High level - pertaining to planning
Warm Site
Strategic
Education
Blackout
4. More than one CPU on a single board
Honeynet
Cipher Text
Multi-Core
Cross Certification
5. An attack involving the hijacking of a TCP session by predicting a sequence number.
Access Control Lists
Sequence Attacks
Risk
Common Criteria
6. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Orange Book B2 Classification
SQL Injection
Off-Site Storage
Data Hiding
7. Event(s) that cause harm
Incident
Due Diligence
Access Control Lists
Key Clustering
8. A hash that has been further encrypted with a symmetric algorithm
Keyed-Hashing For Message Authentication
Modification
Locard's Principle
Elements of Negligence
9. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Switches
Need-To-Know
3 Types of harm Addressed in computer crime laws
Private Branch Exchange (PBX)
10. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Hash Function
Exposure
Control
Test Plan
11. OOP concept of a template that consist of attributes and behaviors
Class
Time Of Check/Time Of Use
Countermeasure
User
12. Induces a crime - tricks a person - and is illegal
Assembler
Entrapment
Orange Book D Classification
Multi-Programming
13. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Interpreter
Reciprocal Agreement
Tactical
Critical Functions
14. Actions measured against either a policy or what a reasonable person would do
Electromagnetic Interference (EMI)
On-Site
Due Diligence
Worm
15. Of a system without prior knowledge by the tester or the tested
Near Site
Shift Cipher (Caesar)
Database Replication
Double Blind Testing
16. Data or interference that can trigger a false positive
Noise
Tactical
Permutation /Transposition
Standalone Test
17. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Information Technology Security Evaluation Criteria - ITSEC
Alternate Site
Classification
Data Backup Strategies
18. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Malformed Input
Declaration
Data Integrity
Recovery Strategy
19. A temporary public file to inform others of a compromised digital certificate
SQL Injection
Certificate Revocation List (CRL)
Embedded
TNI (Red Book)
20. False memory reference
Criminal Law
Basics Of Secure Design
Risk Assessment / Analysis
Dangling Pointer
21. Control category- to give instructions or inform
Directive
Fire Suppression
Algorithm
Privacy Laws
22. Hardware or software that is part of a larger system
Multiplexers
Embedded
Orange Book B1 Classification
Backup
23. Is secondhand and usually not admissible in court
Hearsay Evidence
Architecture
Acronym for American Standard Code for Information Interchange (ASCII)
Declaration
24. The study of cryptography and cryptanalysis
Guidelines
Cryptology
Birthday Attack
Life Cycle of Evidence
25. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
Supervisor Mode (monitor - system - privileged)
Mobile Site
Security Domain
TEMPEST
26. To jump to a conclusion
Modems
Administrative Access Controls
Data Dictionary
Inference
27. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Data Integrity
Mirroring
Non-Discretionary Access Control
Confidence Value
28. A backup of data located where staff can gain access immediately
Blind Testing
Test Plan
On-Site
IP Fragmentation
29. A device that sequentially switches multiple analog inputs to the output.
Plain Text
Quantitative Risk Analysis
Security Blueprint
Multiplexers
30. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Legacy Data
Procedure
Common Law
Critical Infrastructure
31. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Overlapping Fragment Attack
Operational Impact Analysis
Database Shadowing
Compensating
32. Vehicle stopping object
Bollard
Coaxial Cable
Object
Content Dependent Access Control
33. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Bridge
BCP Testing Drills and Exercises
Coaxial Cable
Virtual Memory
34. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Trade Secret
Certification
Initialization Vector
Collisions
35. Summary of a communication for the purpose of integrity
Malformed Input
Transients
Message Digest
One Time Pad
36. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Discretionary Access Control (DAC)
Plaintext
MOM
Disk Mirroring
37. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
System Downtime
Investigation
Coaxial Cable
Event
38. Code making
Strong Authentication
Vital Record
Cryptography
Maximum Tolerable Downtime (MTD)
39. Employment education done once per position or at significant change of function
Job Training
Concatenation
Resumption
Payload
40. Eavesdropping on network communications by a third party.
Sniffing
Analysis
Threats
Capability Tables
41. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Botnet
Business Interruption
Rollback
Hot Site
42. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
Data Integrity
Recovery Point Objective (RPO)
Desk Check Test
User
43. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Bridge
Electromagnetic Interference (EMI)
Blind Testing
Journaling
44. Short period of low voltage.
Shift Cipher (Caesar)
Patch Panels
Gateway
Sag/Dip
45. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Business Continuity Program
Change Control
Damage Assessment
Memory Management
46. A software design technique for abstraction of a process
IDS Intrusion Detection System
Data Hiding
Electronic Vaulting
Mobile Recovery
47. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Atomicity
Emergency
Kerberos
Data Backup Strategies
48. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Marking
Fault
Phishing
Incident Response Team
49. A record that must be preserved and available for retrieval if needed.
Full-Interruption test
Recovery Time Objectives
Vital Record
Hot Site
50. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Conflict Of Interest
Mirroring
Orange Book D Classification
Near Site
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests