SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recovery alternative which outsources a business function at a cost
Service Bureau
Teardrop
Cross-Site Scripting
Surge
2. The one person responsible for data - its classification and control setting
TNI (Red Book)
Information Owner
Mirrored Site
Honeypot
3. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Exercise
Encryption
Remanence
Prevention
4. Someone who want to know how something works - typically by taking it apart
Substitution
Hacker
Off-Site Storage
Compression
5. Act of luring an intruder and is legal.
Object Oriented Programming (OOP)
Enticement
Logic Bomb
Directive
6. Evidence must be: admissible - authentic - complete - accurate - and convincing
Polymorphism
Separation Of Duties
Content Dependent Access Control
5 Rules Of Evidence
7. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Orange Book B1 Classification
Uninterruptible Power Supply (UPS)
Pointer
Proprietary
8. Encryption system using shared key/private key/single key/secret key
Recovery
Symmetric
Identification
Analysis
9. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
False Attack Stimulus
Fragmented Data
Crisis
Method
10. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Primary Storage
Atomicity
Isolation
Operational Impact Analysis
11. Less granular organization of controls -
Control Type
Machine Language (Machine Code)
Recovery Point Objective (RPO)
Integrated Test
12. Vehicle stopping object
Pointer
Least Privilege
Bollard
Hearsay
13. Short period of low voltage.
Fault
Information Flow Model
Sag/Dip
User
14. Written suggestions that direct choice to a few alternatives
Guidelines
Satellite
Salami
Full Test (Full Interruption)
15. A Trojan horse with the express underlying purpose of controlling host from a distance
Remote Access Trojan
Watermarking
Assembler
Mobile Site
16. A computer designed for the purpose of studying adversaries
Least Privilege
Honeypot
Multi-Party Control
Cipher Text
17. Requirement to take time off
High-Risk Areas
Resumption
Mission-Critical Application
Mandatory Vacations
18. Impossibility of denying authenticity and identity
Non-Repudiation
Brownout
File Sharing
5 Rules Of Evidence
19. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Due Care
Interception
Compiler
Countermeasure
20. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Reciprocal Agreement
Key Management
Degauss
Interpreter
21. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Event
Hot Spares
Repeaters
Ring Protection
22. Dedicated fast memory located on the same board as the CPU
Electromagnetic Interference (EMI)
CPU Cache
Multi-Processor
Transients
23. A state where two subjects can access the same object without proper mediation
Wait
Operating
Race Condition
Checksum
24. Renders the file inaccessible to the operating system - available to reuse for data storage.
Change Control
Object Oriented Programming (OOP)
File Level Deletion
Non-Discretionary Access Control
25. A collection of data or information that has a name
File
Tort
Fiber Optics
Threats
26. RADIUS - TACACS+ - Diameter
Repeaters
Centralized Access Control Technologies
Mandatory
Privacy Laws
27. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
JPEG (Joint Photographic Experts Group)
Parallel Test
Fire Classes
Alternate Data Streams (File System Forks)
28. An administrative unit or a group of objects and subjects controlled by one reference monitor
Business Recovery Team
Sequence Attacks
Security Domain
Coaxial Cable
29. High level design or model with a goal of consistency - integrity - and balance
Byte Level Deletion
Architecture
Watermarking
Multilevel Security System
30. State of computer - to be running a process
Privacy Laws
Operating
Triage
On-Site
31. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Information Flow Model
Open Mail Relay Servers
Executive Succession
Fire Suppression
32. A passive network attack involving monitoring of traffic.
High-Risk Areas
Eavesdropping
Damage Assessment
Business Interruption Insurance
33. A choice in risk management - to convince another to assume risk - typically by payment
Transfer
Compartmentalize
Threats
Business Continuity Program
34. A control before attack
Multi-Tasking
Emergency Operations Center (EOC)
Structured Walkthrough
Safeguard
35. Periodic - automatic and transparent backup of data in bulk.
System Downtime
Electronic Vaulting
Certificate Revocation List (CRL)
Walk Though
36. An attack involving the hijacking of a TCP session by predicting a sequence number.
Examples of non-technical security components
Business Records
Modems
Sequence Attacks
37. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Monitor
Stopped
Mandatory
Packet Filtering
38. Recording the Who What When Where How of evidence
Chain Of Custody
Mixed Law System
Fragmented Data
Recovery
39. Threats x Vulnerability x Asset Value = Total Risk
Total Risk
Layering
Application Programming Interface
Risk Assessment / Analysis
40. An asymmetric cryptography mechanism that provides authentication.
Digital Signature
Damage Assessment
Patch Management
Transfer
41. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Business Recovery Team
File
Site Policy Awareness
Electrostatic Discharge
42. The event signaling an IDS to produce an alarm when no attack has taken place
Fire Classes
False Attack Stimulus
Warm Site
Control Type
43. Individuals and departments responsible for the storage and safeguarding of computerized data.
Admissible
Data Custodian
Double Blind Testing
Site Policy
44. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Data Custodian
Malformed Input
Bumping
Structured Walk-Through Test
45. Indivisible - data field must contain only one value that either all transactions take place or none do
The ACID Test
Atomicity
Replication
Change Control
46. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Test Plan
Data Backups
Incident
IDS Intrusion Detection System
47. To evaluate the current situation and make basic decisions as to what to do
Gateway
Data Owner
Legacy Data
Triage
48. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Analysis
Alarm Filtering
Alert
Electronic Vaulting
49. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Marking
Incident Manager
Reciprocal Agreement
Data Backup Strategies
50. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Damage Assessment
Full Test (Full Interruption)
Civil Law
Switches
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests