SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A record that must be preserved and available for retrieval if needed.
Surge
Vital Record
Qualitative
Information Flow Model
2. Intellectual property protection for the expression of an idea
Copyright
Codec
Transfer
File Sharing
3. Mathematical function that determines the cryptographic operations
Algorithm
Denial Of Service
Trade Secret
Physical Tampering
4. Potential danger to information or systems
Remote Journaling
Blackout
Threats
Classification
5. A database backup type which records at the transaction level
Incident Response Team
Remote Journaling
Hot Spares
Structured Walk-Through Test
6. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Marking
Cipher Text
Hub
Job Training
7. A planned or unplanned interruption in system availability.
System Downtime
Information Technology Security Evaluation Criteria - ITSEC
Data Hiding
Desk Check Test
8. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Liability
Quantitative Risk Analysis
Classification Scheme
Data Diddler
9. A type of attack involving attempted insertion - deletion or altering of data.
Repeaters
Monitor
Modification
Cryptovariable
10. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Coaxial Cable
Object Oriented Programming (OOP)
Virtual Memory
Business Interruption
11. Forging of an IP address.
Triage
Data Recovery
Patch Management
IP Address Spoofing
12. Memory management technique that allows two processes to run concurrently without interaction
Denial Of Service
Infrastructure
Botnet
Protection
13. Written step-by-step actions
IDS Intrusion Detection System
Relocation
Procedure
Damage Assessment
14. Renders the record inaccessible to the database management system
Radio Frequency Interference (RFI)
Declaration
Marking
Record Level Deletion
15. Physical description on the exterior of an object that communicates the existence of a label
Hot Site
Marking
Non-Interference
Least Privilege
16. The principles a person sets for themselves to follow
Ethics
Alert
Risk Assessment / Analysis
Operating
17. Owner directed mediation of access
Site Policy
Discretionary
Business Continuity Planning (BCP)
Failure Modes and Effect Analysis (FEMA)
18. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Crisis
Mirroring
Detective
Criminal Law
19. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Residual Risk
Common Law
Certification
File Sharing
20. An asymmetric cryptography mechanism that provides authentication.
Digital Signature
Acronym for American Standard Code for Information Interchange (ASCII)
Spam
Governance
21. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Integrated Test
The ACID Test
Business Interruption Insurance
Class
22. Process whereby data is removed from active files and other data storage structures
Reference Monitor
Deletion
Operational Test
Business Unit Recovery
23. Mitigation of system or component loss or interruption through use of backup capability.
Fault Tolerance
Orange Book C2 Classification
Simulation Test
Spiral
24. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Shift Cipher (Caesar)
Symmetric
System Downtime
Residual Risk
25. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Mirrored Site
Multi-Programming
Territoriality
State Machine Model
26. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
File Extension
Shielding
Concentrator
Information Risk Management (IRM)
27. Those who initiate the attack
Threat Agent
Recovery
Non-Repudiation
Forward Recovery
28. A program with an inappropriate second purpose
Trojan Horse
Logic Bomb
Information Flow Model
Parallel Test
29. Recovery alternative - short-term - high cost movable processing location
3 Types of harm Addressed in computer crime laws
Mobile Site
Forward Recovery
Desk Check Test
30. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Multi-Party Control
Restoration
Hard Disk
E-Mail Spoofing
31. Business and technical process of applying security software updates in a regulated periodic way
Data Owner
Patch Management
Restoration
Investigation
32. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
System Downtime
Digital Signature
Uninterruptible Power Supply (UPS)
Non-Discretionary Access Control
33. Granular decision by a system of permitting or denying access to a particular resource on the system
Cross Certification
Access Control
Authorization
Access Control Matrix
34. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Recovery Time Objectives
Entrapment
Plaintext
ITSEC
35. An event which stops business from continuing.
Recovery
Hot Spares
Data Hiding
Disaster
36. Momentary loss of power
Proprietary
Non-Discretionary Access Control
Service Bureau
Fault
37. A process state - (blocked) needing input before continuing
Threat Agent
Wait
2-Phase Commit
Worm
38. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Event
Trademark
Civil Or Code Law
Emergency Procedures
39. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy
Multi-Tasking
SQL Injection
Alert/Alarm
Mock Disaster
40. Unauthorized access of network devices.
Mission-Critical Application
Physical Tampering
Algorithm
Information Technology Security Evaluation Criteria - ITSEC
41. Natural occurrence in circuits that are in close proximity
Processes are Isolated By
Interference (Noise)
Encryption
Discretionary
42. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Deleted File
Mock Disaster
Detection
Desk Check Test
43. Maintenance procedures outline the process for the review and update of business continuity plans.
Spyware
Plan Maintenance Procedures
Birthday Attack
Data Recovery
44. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Backup
Journaling
Business Recovery Team
Data Backups
45. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Byte Level Deletion
3 Types of harm Addressed in computer crime laws
Complete
SYN Flooding
46. A computer designed for the purpose of studying adversaries
Byte
Honeypot
Byte Level Deletion
Cache
47. Outputs within a given function are the same result
Interception
Standalone Test
Collisions
Shielding
48. Asymmetric encryption of a hash of message
Object Oriented Programming (OOP)
Multi-Party Control
Digital Signature
Analysis
49. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Trojan Horse
Liability
TCSEC (Orange Book)
Surveillance
50. Of a system without prior knowledge by the tester or the tested
JPEG (Joint Photographic Experts Group)
Durability
Examples of technical security components
Double Blind Testing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests