SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Physical Tampering
The ACID Test
Conflict Of Interest
Forward Recovery
2. A risk assessment method - measurable real money cost
Exercise
SYN Flooding
Emergency Procedures
Quantitative
3. To load the first piece of software that starts a computer.
Identification
Wait
Boot (V.)
Orange Book D Classification
4. Dedicated fast memory located on the same board as the CPU
Payload
CPU Cache
Restoration
Threats
5. Maximum tolerance for loss of certain business function - basis of strategy
Radio Frequency Interference (RFI)
Recovery Time Objectives
Side Channel Attack
Territoriality
6. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Collisions
Tar Pits
Data Warehouse
Active Data
7. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.
Non-Discretionary Access Control
Active Data
Maximum Tolerable Downtime (MTD)
Orange Book D Classification
8. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.
Proxies
Byte
Disaster Recovery Teams (Business Recovery Teams)
Chain Of Custody
9. High level - pertaining to planning
Strategic
Mixed Law System
Physical Tampering
Burn
10. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Control Type
TCSEC (Orange Book)
Acronym for American Standard Code for Information Interchange (ASCII)
Multi-Core
11. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Injection
Brownout
Safeguard
Faraday Cage/ Shield
12. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
5 Rules Of Evidence
Interference (Noise)
Deleted File
Mock Disaster
13. A type of attack involving attempted insertion - deletion or altering of data.
Side Channel Attack
False Attack Stimulus
Keyed-Hashing For Message Authentication
Modification
14. Recovery alternative which includes cold site and some equipment and infrastructure is available
Site Policy
Threats
Cipher Text
Warm Site
15. Someone who wants to cause harm
Emergency
IDS Intrusion Detection System
Aggregation
Attacker (Black hat - Hacker)
16. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Degauss
Electronic Vaulting
On-Site
Mission-Critical Application
17. Regular operations are stopped and where processing is moved to the alternate site.
Investigation
Full-Interruption test
Discretionary Access Control (DAC)
Threats
18. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. Recovery alternative - a building only with sufficient power - and HVAC
Denial Of Service
Ring Protection
Cold Site
Multi-Processing
20. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Control
Remote Journaling
Mandatory
Recovery Strategy
21. Location where coordination and execution of BCP or DRP is directed
Emergency Operations Center (EOC)
Disaster
Complete
Workaround Procedures
22. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
Orange Book A Classification
Pointer
Archival Data
Hash Function
23. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Data Marts
Civil Law
Embedded Systems
Governance
24. A software design technique for abstraction of a process
Common Law
Critical Infrastructure
Residual Risk
Data Hiding
25. A mathematical tool for verifying no unintentional changes have been made
Checksum
Residual Data
Twisted Pair
Access Control Attacks
26. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Executive Succession
Operational
Job Training
Shadowing (file shadowing)
27. Outputs within a given function are the same result
Access Control Lists
Collisions
Disk Mirroring
Incident Manager
28. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
JPEG (Joint Photographic Experts Group)
Picking
Site Policy
Interception
29. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.
ISO/IEC 27002
Virtual Memory
Permutation /Transposition
Recovery Point Objective (RPO)
30. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Orange Book B2 Classification
Fiber Optics
Multi-Processor
Security Domain
31. Mediation of covert channels must be addressed
Administrative Access Controls
Tapping
Information Flow Model
Source Routing Exploitation
32. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
One Time Pad
Electronic Vaulting
Total Risk
33. Return to a normal state
Recovery
Architecture
Embedded Systems
Packet Filtering
34. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.
Data Dictionary
Access Point
Plaintext
Integrated Test
35. Induces a crime - tricks a person - and is illegal
Custodian
Qualitative
Fire Classes
Entrapment
36. Searching for wireless networks in a moving car.
ISO/IEC 27002
Business Continuity Steering Committee
Kerberos
War Driving
37. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Trademark
Multi-Party Control
Change Control
Privacy Laws
38. Small data warehouse
Data Marts
Orange Book C2 Classification
Change Control
Total Risk
39. Some systems are actually run at the alternate site
Off-Site Storage
Residual Data
Parallel Test
Interference (Noise)
40. A process state - to be executing a process on the CPU
ff Site
Fragmented Data
Critical Records
Running
41. Natural occurrence in circuits that are in close proximity
Spyware
Codec
Interference (Noise)
Interpreter
42. Those who initiate the attack
Picking
Threat Agent
Capability Tables
Shadowing (file shadowing)
43. A control after attack
Central Processing Unit (CPU)
Countermeasure
Residual Risk
Hot Site
44. Physical description on the exterior of an object that communicates the existence of a label
Moore's Law
Marking
Supervisor Mode (monitor - system - privileged)
Highly Confidential
45. To set the clearance of a subject or the classification of an object
File Level Deletion
Masked/Interruptible
TCSEC (Orange Book)
Labeling
46. Consume resources to a point of exhaustion - loss of availability
Denial Of Service
Basics Of Secure Design
Masquerading
Locard's Principle
47. Power surge
Electrostatic Discharge
Routers
ISO/IEC 27001
Database Shadowing
48. Control type- that is communication based - typically written or oral
Mandatory
Administrative
Mission-Critical Application
Digital Signature
49. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
BCP Testing Drills and Exercises
On-Site
Picking
Waterfall
50. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Emergency Procedures
DR Or BC Coordinator
Kerberos
Recovery Period
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests