SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Malware that subverts the detective controls of an operating system
Centralized Access Control Technologies
Need-To-Know
Capability Tables
Rootkit
2. Induces a crime - tricks a person - and is illegal
Triage
Entrapment
Distributed Processing
Discretionary
3. A control after attack
Data Owner
User
Countermeasure
Mandatory Access Control (MAC)
4. Natural occurrence in circuits that are in close proximity
SQL Injection
Interference (Noise)
Encipher
Criminal Law
5. OOP concept of a template that consist of attributes and behaviors
Honeynet
Class
Waterfall
Business Records
6. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Forward Recovery
Polyalphabetic
Key Escrow
Masquerading
7. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Record Level Deletion
Mock Disaster
Custodian
Operational Test
8. An event which stops business from continuing.
Access Control Matrix
Spyware
Recovery
Disaster
9. Evaluation of a system without prior knowledge by the tester
Blind Testing
Bridge
Orange Book B2 Classification
Reference Monitor
10. Record history of incident
Accountability
Certificate Revocation List (CRL)
Analysis
Tracking
11. The level and label given to an individual for the purpose of compartmentalization
Spyware
Asymmetric
Cryptography
Security Clearance
12. High level design or model with a goal of consistency - integrity - and balance
Architecture
Computer Forensics
Business Interruption Insurance
Incident
13. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
System Life Cycle
Picking
Business Interruption Insurance
Radio Frequency Interference (RFI)
14. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Call Tree
Authorization
Business Continuity Steering Committee
Risk Mitigation
15. A covert storage channel on the file attribute
Reference Monitor
Worm
Full-Interruption test
Alternate Data Streams (File System Forks)
16. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Containment
Modems
Routers
Critical Functions
17. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Highly Confidential
Interference (Noise)
Cryptovariable
Locard's Principle
18. Measures followed to restore critical functions following a security incident.
Machine Language (Machine Code)
Recovery
Quantitative Risk Analysis
Packet Filtering
19. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Highly Confidential
Critical Functions
Notification
Residual Risk
20. Long term knowledge building
Common Criteria
Education
Contingency Plan
Logic Bomb
21. Memory management technique which allows data to be moved from one memory address to another
Relocation
Classification
TNI (Red Book)
Remote Journaling
22. Communicate to stakeholders
Collisions
Database Replication
Debriefing/Feedback
Access Control Lists
23. Specific format of technical and physical controls that support the chosen framework and the architecture
Infrastructure
Hacker
Simulation
Standard
24. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Archival Data
Botnet
Deterrent
Deleted File
25. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Checklist Test
Operational Impact Analysis
False Attack Stimulus
Overlapping Fragment Attack
26. Reprogrammable basic startup instructions
Civil Or Code Law
Public Key Infrastructure (PKI)
Firmware
Layering
27. One entity with two competing allegiances
Risk Mitigation
Work Factor
Plan Maintenance Procedures
Conflict Of Interest
28. Communication of a security incident to stakeholders and data owners.
Layering
Fire Suppression
Notification
Relocation
29. An asymmetric cryptography mechanism that provides authentication.
Digital Signature
Hearsay Evidence
ITSEC
Twisted Pair
30. Converts source code to an executable
Civil Law
Compiler
Fire Detection
Exposure
31. Consume resources to a point of exhaustion - loss of availability
Stopped
Pervasive Computing and Mobile Computing Devices
Instance
Denial Of Service
32. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Crisis
Threats
Certification
Declaration
33. A telephone exchange for a specific office or business.
Ring Protection
Compensating
Private Branch Exchange (PBX)
Processes are Isolated By
34. Information about data or records
Distributed Processing
Metadata
Alternate Data Streams (File System Forks)
Payload
35. Memory management technique that allows two processes to run concurrently without interaction
Protection
Data Custodian
Crisis
Covert Channel
36. Creation distribution update and deletion
HTTP Response Splitting
False Attack Stimulus
Key Management
Covert Channel
37. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
Workaround Procedures
Tapping
Business Records
38. Mitigation of system or component loss or interruption through use of backup capability.
Due Care
Fault Tolerance
Quantitative Risk Analysis
Mantrap (Double Door System)
39. Recovery alternative - a building only with sufficient power - and HVAC
JPEG (Joint Photographic Experts Group)
Cold Site
File Level Deletion
Routers
40. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Standalone Test
Compensating
ff Site
Asymmetric
41. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Least Privilege
Exposure
Tort
Intrusion Detection Systems
42. A signal suggesting a system has been or is being attacked.
Residual Data
Risk Assessment
Deleted File
Alert/Alarm
43. Someone who want to know how something works - typically by taking it apart
Highly Confidential
Hacker
Structured Walkthrough
Top Secret
44. Ertaining to a number system that has just two unique digits.
Chain Of Custody
Binary
Security Domain
Failure Modes and Effect Analysis (FEMA)
45. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Mitigate
Damage Assessment
Blackout
Byte Level Deletion
46. A distributed system's transaction control that requires updates to complete or rollback
2-Phase Commit
Transients
Computer System Evidence
Brownout
47. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Business Impact Assessment (BIA)
Desk Check Test
Discretionary Access Control (DAC)
Worldwide Interoperability for Microwave Access (WI-MAX )
48. To stop damage from spreading
Parallel Test
Liability
Containment
Modification
49. Just enough access to do the job
Need-To-Know
BCP Testing Drills and Exercises
Object Reuse
Least Privilege
50. Binary decision by a system of permitting or denying access to the entire system
Tort
Encryption
Authentication
5 Rules Of Evidence
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests