SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unsolicited advertising software
Denial Of Service
ITSEC
Top Secret
Adware
2. A type of multitasking that allows for more even distribution of computing time among competing request
Accurate
Burn
Tar Pits
Preemptive
3. Provides a physical cross connect point for devices.
Radio Frequency Interference (RFI)
JPEG (Joint Photographic Experts Group)
Patch Panels
TNI (Red Book)
4. Hitting a filed down key in a lock with a hammer to open without real key
Binary
Cross Certification
Incident Response Team
Bumping
5. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Checksum
Reference Monitor
Remote Journaling
Dictionary Attack
6. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
Information Owner
Data Owner
System Life Cycle
Multi-Processor
7. A type of attack involving attempted insertion - deletion or altering of data.
Modification
Hub
Malformed Input
Spyware
8. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Deleted File
Orange Book A Classification
Site Policy Awareness
Business Impact Assessment (BIA)
9. More than one processor sharing same memory - also know as parallel systems
Multi-Processor
Malformed Input
Log
Trade Secret
10. An availability attack - to consume resources to the point of exhaustion
Checklist Test (desk check)
Patch Management
Denial Of Service
Cross Training
11. Code breaking - practice of defeating the protective properties of cryptography.
Cryptanalysis
Embedded Systems
Test Plan
Security Kernel
12. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Total Risk
Attacker (Black hat - Hacker)
Hot Spares
BCP Testing Drills and Exercises
13. Eavesdropping on network communications by a third party.
Sniffing
Electronic Vaulting
Malformed Input
Encipher
14. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Electromagnetic Interference (EMI)
Structured Walkthrough
Standalone Test
Concentrator
15. An alert or alarm that is triggered when no actual attack has taken place
Access Control
Running Key
Primary Storage
False (False Positive)
16. Can be statistical (monitor behavior) or signature based (watch for known attacks)
Near Site
IDS Intrusion Detection System
Legacy Data
Data Recovery
17. Recovery alternative - everything needed for the business function - except people and last backup
Civil Law
Criminal Law
Mixed Law System
Hot Site
18. Eight bits.
Byte
Journaling
Separation Of Duties
Capability Tables
19. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
Encryption
Centralized Access Control Technologies
Fire Prevention
Bit
20. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Standalone Test
Adware
JPEG (Joint Photographic Experts Group)
Patch Panels
21. Reduces causes of fire
Mandatory
Fire Prevention
Threats
Job Training
22. A planned or unplanned interruption in system availability.
Desk Check Test
Plaintext
Honeypot
System Downtime
23. A database that contains the name - type - range of values - source and authorization for access for each data element
Mirroring
Data Dictionary
Open Mail Relay Servers
Wait
24. Act of scrambling the cleartext message by using a key.
Encipher
Detective
Cryptanalysis
Fire Classes
25. The problems solving state - the opposite of supervisor mode
Security Clearance
Kerckhoff's Principle
ISO/IEC 27002
User Mode (problem or program state)
26. A state where two subjects can access the same object without proper mediation
Aggregation
Blackout
Race Condition
Fraggle
27. A collection of information designed to reduce duplication and increase integrity
Intrusion Prevention Systems
Enticement
Electronic Vaulting
Databases
28. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Multi-Party Control
Uninterruptible Power Supply (UPS)
Fragmented Data
Admissible
29. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Remote Access Trojan
Operational Impact Analysis
Legacy Data
Simulation
30. Vehicle or tool that exploits a weakness
Threats
Custodian
3 Types of harm Addressed in computer crime laws
Moore's Law
31. Firewalls - encryption - and access control lists
Examples of technical security components
Bit
Shift Cipher (Caesar)
Electrostatic Discharge
32. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Standard
Technical Access Controls
Hub
Control Category
33. The guardian of asset(s) - a maintenance activity
Source Routing Exploitation
Denial Of Service
Initialization Vector
Custodian
34. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Business Continuity Steering Committee
Malformed Input
Chain of Custody
MOM
35. Real-time - automatic and transparent backup of data.
Remote Journaling
MOM
Radio Frequency Interference (RFI)
Desk Check Test
36. Data or interference that can trigger a false positive
Critical Records
Transfer
Noise
Disk Mirroring
37. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Business Continuity Planning (BCP)
Entrapment
Policy
Denial Of Service
38. Forgery of the sender's email address in an email header.
Confidence Value
Keyed-Hashing For Message Authentication
Total Risk
E-Mail Spoofing
39. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Deletion
Redundant Array Of Independent Drives (RAID)
Sequence Attacks
Crisis
40. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Initialization Vector
Complete
Mantrap (Double Door System)
Cache
41. Actions measured against either a policy or what a reasonable person would do
Due Diligence
Switches
Kernel
User Mode (problem or program state)
42. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Test Plan
Analysis
Logic Bomb
Checklist Test
43. Alerts personnel to the presence of a fire
IDS Intrusion Detection System
Electromagnetic Interference (EMI)
Memory Management
Fire Detection
44. A program that waits for a condition or time to occur that executes an inappropriate activity
Logic Bomb
Access Control
Vulnerability
SQL Injection
45. Dedicated fast memory located on the same board as the CPU
Encipher
CPU Cache
File
Corrective
46. Wrong against society
Fiber Optics
Criminal Law
Birthday Attack
Metadata
47. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Faraday Cage/ Shield
Virtual Memory
Critical Functions
Surveillance
48. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Mobile Recovery
Buffer Overflow
Discretionary Access Control (DAC)
Generator
49. Renders the record inaccessible to the database management system
Record Level Deletion
Application Programming Interface
Basics Of Secure Design
Binary
50. Claiming another's identity at a physical level
Administrative Laws
Fraggle
Time Of Check/Time Of Use
Masquerading
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests