SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Requirement of access to data for a clearly defined purpose
Authorization
Electronic Vaulting
Need-To-Know
Cross Certification
2. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Hot Site
Masked/Interruptible
Business Interruption Insurance
Repeaters
3. Unsolicited advertising software
Residual Data
Hearsay
Adware
Business Continuity Program
4. People protect their domain
Territoriality
Total Risk
Mobile Site
TIFF (Tagged Image File Format)
5. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Operational Test
Surveillance
Access Control Lists
Data Backup Strategies
6. For PKI - to store another copy of a key
Bit
Electrostatic Discharge
Firewall
Key Escrow
7. Firewalls - encryption - and access control lists
Polyalphabetic
Job Rotation
Rollback
Examples of technical security components
8. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Residual Data
Aggregation
Memory Management
Initialization Vector
9. Someone who wants to cause harm
Directive
Attacker (Black hat - Hacker)
Metadata
Notification
10. Potential danger to information or systems
Data Leakage
Slack Space
Threats
Crisis
11. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Mission-Critical Application
Multi-Party Control
Electronic Vaulting
Hacker
12. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Fraggle
Lattice
Non-Repudiation
Policy
13. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Byte
Private Branch Exchange (PBX)
Off-Site Storage
Noise
14. OOP concept of a class's details to be hidden from object
Business Recovery Timeline
Private Branch Exchange (PBX)
Data Custodian
Encapsulation
15. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Patch Management
3 Types of harm Addressed in computer crime laws
Masked/Interruptible
Data Owner
16. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Worldwide Interoperability for Microwave Access (WI-MAX )
Orange Book D Classification
Examples of non-technical security components
Computer System Evidence
17. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Residual Risk
Critical Records
Recovery Period
Modems
18. A shield against leakage of electromagnetic signals.
Compensating
Incident Manager
Electromagnetic Interference (EMI)
Faraday Cage/ Shield
19. Using small special tools all tumblers of the lock are aligned - opening the door
Surge
Event
Picking
Compression
20. Asymmetric encryption of a hash of message
Digital Signature
Emergency Operations Center (EOC)
Hearsay Evidence
Symmetric
21. Object reuse protection and auditing
ISO/IEC 27002
Accurate
Threats
Orange Book C2 Classification
22. Malware that subverts the detective controls of an operating system
Rootkit
Open Mail Relay Servers
Denial Of Service
Steganography
23. Searching for wireless networks in a moving car.
Trade Secret
War Driving
Encapsulation
Bit
24. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Fault
Pointer
Blind Testing
Fire Classes
25. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.
Emergency Operations Center (EOC)
Redundant Array Of Independent Drives (RAID)
Modification
Forensic Copy
26. Controls deployed to avert unauthorized and/or undesired actions.
Residual Risk
Prevention
Key Space
Orange Book C Classification
27. A group or network of honeypots
Highly Confidential
Structured Walkthrough
Slack Space
Honeynet
28. Program that inappropriately collects private data or activity
Data Backups
Marking
Brouter
Spyware
29. One entity with two competing allegiances
Cookie
Redundant Array Of Independent Drives (RAID)
Conflict Of Interest
Adware
30. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Mandatory Access Control (MAC)
Threats
Tar Pits
User
31. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Near Site
Vital Record
Critical Infrastructure
Top Secret
32. Total number of keys available that may be selected by the user of a cryptosystem
Key Space
Remote Journaling
Monitor
Mandatory Vacations
33. Recovery alternative which outsources a business function at a cost
Kerberos
Honeynet
Service Bureau
Firmware
34. Initial surge of current
Inrush Current
Multiplexers
Non-Interference
Enticement
35. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Cryptanalysis
User Mode (problem or program state)
Hot Spares
Structured Walkthrough
36. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Business Continuity Steering Committee
Redundant Array Of Independent Drives (RAID)
Contingency Plan
Emergency Procedures
37. Mitigation of system or component loss or interruption through use of backup capability.
Surge Suppressor
Bridge
Fault Tolerance
Tapping
38. A protocol for the efficient transmission of voice over the Internet
Database Shadowing
Voice Over IP (VOIP)
Trapdoors (Backdoors) (Maintenance Hooks)
Brute Force
39. Eight bits.
Qualitative
Radio Frequency Interference (RFI)
ITSEC
Byte
40. A choice in risk management - to convince another to assume risk - typically by payment
Criminal Law
Transfer
Education
Business Continuity Program
41. A passive network attack involving monitoring of traffic.
Eavesdropping
JPEG (Joint Photographic Experts Group)
Botnet
Multi-Programming
42. Organized group of compromised computers
Mobile Recovery
Botnet
Hub
Multi-Programming
43. Converts a high level language into machine language
Assembler
Bollard
Hub
Replication
44. Interception of a communication session by an attacker.
Control Type
Certification
Hijacking
Prevention
45. Regular operations are stopped and where processing is moved to the alternate site.
Time Of Check/Time Of Use
Full-Interruption test
Key Management
DR Or BC Coordinator
46. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Debriefing/Feedback
Risk Assessment / Analysis
Full-Interruption test
Virtual Memory
47. Memory management technique that allows two processes to run concurrently without interaction
Structured Walk-Through Test
TNI (Red Book)
Protection
Trapdoors (Backdoors) (Maintenance Hooks)
48. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Restoration
Common Law
Keyed-Hashing For Message Authentication
UPS
49. Induces a crime - tricks a person - and is illegal
Inrush Current
Entrapment
Accreditation
Injection
50. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
ff Site
Computer Forensics
Business Interruption Insurance
Copyright
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests