SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Crisis
Detection
Off-Site Storage
Hard Disk
2. Pertaining to law - lending it self to one side of an argument
Gateway
Authentication
Convincing
Full Test (Full Interruption)
3. A planned or unplanned interruption in system availability.
Dangling Pointer
Desk Check Test
Procedure
System Downtime
4. Encryption system using a pair of mathematically related unequal keys
Work Factor
Asymmetric
Risk
Recovery
5. Written core statements that rarely change
Policy
Birthday Attack
BCP Testing Drills and Exercises
Standard
6. Specific format of technical and physical controls that support the chosen framework and the architecture
On-Site
Certification
Infrastructure
Tapping
7. Control category- to discourage an adversary from attempting to access
Deterrent
Compiler
Replication
Mirroring
8. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Overlapping Fragment Attack
Full-Interruption test
Collisions
Full Test (Full Interruption)
9. Uncleared buffers or media
Emanations
Object Reuse
Restoration
CPU Cache
10. Momentary loss of power
Criminal Law
Fault
Framework
False Attack Stimulus
11. A state where two subjects can access the same object without proper mediation
Mock Disaster
Race Condition
Birthday Attack
System Life Cycle
12. Mediation of covert channels must be addressed
Bit
Trapdoors (Backdoors) (Maintenance Hooks)
Information Flow Model
Content Dependent Access Control
13. A layer 2 device that used to connect two or more network segments and regulate traffic.
Incident Manager
Shift Cipher (Caesar)
Codec
Switches
14. A design methodology which executes in a linear one way fashion
Criminal Law
Phishing
Access Control
Waterfall
15. The principles a person sets for themselves to follow
Due Care
TIFF (Tagged Image File Format)
Ethics
Metadata
16. For PKI - to store another copy of a key
Business Interruption Insurance
Aggregation
Key Escrow
Radio Frequency Interference (RFI)
17. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Least Privilege
Information Technology Security Evaluation Criteria - ITSEC
Failure Modes and Effect Analysis (FEMA)
Centralized Access Control Technologies
18. Renders the record inaccessible to the database management system
Full Test (Full Interruption)
Orange Book D Classification
Record Level Deletion
Notification
19. Line noise that is superimposed on the supply circuit.
Transients
Criminal Law
Tapping
War Driving
20. A shield against leakage of electromagnetic signals.
Key Escrow
Faraday Cage/ Shield
Basics Of Secure Design
Business Interruption
21. Potentially compromising leakage of electrical or acoustical signals.
Emanations
IDS Intrusion Detection System
Burn
Accurate
22. A database backup type which records at the transaction level
Degauss
Remote Journaling
Detective
Multilevel Security System
23. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
War Dialing
Procedure
Infrastructure
Multi-Processor
24. Controls for logging and alerting
Data Backups
Supervisor Mode (monitor - system - privileged)
Multiplexers
Intrusion Detection Systems
25. To execute more than one instruction at an instant in time
Declaration
File Shadowing
Due Care
Multi-Processing
26. Potential danger to information or systems
Threats
TIFF (Tagged Image File Format)
Corrective
Data Owner
27. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.
Microwave
Chain Of Custody
Mirrored Site
Key Clustering
28. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Business Records
Blind Testing
Computer Forensics
Network Attached Storage (NAS)
29. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Data Warehouse
Recovery Period
Targeted Testing
Plan Maintenance Procedures
30. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Relocation
Directive
File Server
Uninterruptible Power Supply (UPS)
31. Creation distribution update and deletion
Tapping
Key Management
Residual Data
Recovery
32. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Disk Mirroring
High-Risk Areas
Hearsay Evidence
Redundant Servers
33. Fault tolerance for power
Triage
War Dialing
Cryptography
Generator
34. Impossibility of denying authenticity and identity
Reference Monitor
Disaster Recovery Teams (Business Recovery Teams)
Non-Repudiation
Residual Data
35. A Denial of Service attack that floods the target system with connection requests that are not finalized.
Checklist Test (desk check)
SYN Flooding
Payload
Packet Filtering
36. Subjects will not interact with each other's objects
Bit
Side Channel Attack
Non-Interference
Deadlock
37. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Packet Filtering
Need-To-Know
Honeypot
Highly Confidential
38. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Content Dependent Access Control
Data Integrity
Alert
Sharing
39. System mediation of access with the focus on the context of the request
Object Oriented Programming (OOP)
Business Continuity Steering Committee
Content Dependent Access Control
War Driving
40. Forging of an IP address.
File Level Deletion
Redundant Array Of Independent Drives (RAID)
Digital Signature
IP Address Spoofing
41. Measures followed to restore critical functions following a security incident.
Notification
IP Address Spoofing
Recovery
Source Routing Exploitation
42. A running key using a random key that is never used again
Radio Frequency Interference (RFI)
One Time Pad
Exercise
Adware
43. For PKI - to have more than one person in charge of a sensitive function
Multi-Party Control
Faraday Cage/ Shield
Concentrator
Application Programming Interface
44. Recovery alternative which includes cold site and some equipment and infrastructure is available
Critical Functions
Brownout
Masquerading
Warm Site
45. Potentially retrievable data residue that remains following intended erasure of data.
Mirrored Site
Remanence
Memory Management
Digital Signature
46. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Sequence Attacks
Cookie
High-Risk Areas
Call Tree
47. May be responsible for overall recovery of an organization or unit(s).
DR Or BC Coordinator
Enticement
Teardrop
Decipher
48. Process of statistically testing a data set for the likelihood of relevant information.
Application Programming Interface
Digital Certificate
Recovery Point Objective (RPO)
Sampling
49. Written step-by-step actions
Procedure
Mandatory Access Control (MAC)
Attacker (Black hat - Hacker)
Electrostatic Discharge
50. Memory management technique that allows two processes to run concurrently without interaction
Protection
Kernel
Discretionary Access Control (DAC)
Moore's Law
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests