SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Business Impact Analysis
High-Risk Areas
Declaration
EMI
2. A process state - (blocked) needing input before continuing
Blackout
Identification
Wait
Deadlock
3. Unchecked data which spills into another location in memory
Tapping
Patent
Buffer Overflow
Mirroring
4. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.
Phishing
Restoration
Privacy Laws
Fiber Optics
5. A form of data hiding which protects running threads of execution from using each other's memory
Emergency Operations Center (EOC)
Process Isolation
Content Dependent Access Control
Data Dictionary
6. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Recovery Strategy
Cryptovariable
Waterfall
Common Law
7. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
Interpreter
Contingency Plan
Object Oriented Programming (OOP)
Salami
8. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.
Processes are Isolated By
Hash Function
Patent
ISO/IEC 27002
9. Descrambling the encrypted message with the corresponding key
TCSEC (Orange Book)
TNI (Red Book)
Decipher
Threads
10. Business and technical process of applying security software updates in a regulated periodic way
Hub
Patch Management
Bumping
Cold Site
11. Statistical probabilities of a collision are more likely than one thinks
Cryptanalysis
2-Phase Commit
Birthday Attack
Slack Space
12. OOP concept of an object's abilities - what it does
Residual Risk
Method
Business Continuity Steering Committee
Service Bureau
13. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Examples of non-technical security components
Accreditation
Internal Use Only
Spiral
14. Mitigate damage by isolating compromised systems from the network.
Proprietary
Alarm Filtering
Hearsay
Containment
15. Low level - pertaining to planning
Sniffing
Recovery Time Objectives
Keystroke Logging
Tactical
16. The managerial approval to operate a system based upon knowledge of risk to operate
Security Clearance
Accreditation
One Time Pad
Sniffing
17. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
2-Phase Commit
Embedded Systems
Uninterruptible Power Supply (UPS)
Service Bureau
18. Converts source code to an executable
Quantitative
Detective
Compiler
Incident Handling
19. Object based description of a single resource and the permission each subject
Bumping
Access Control Lists
Orange Book B1 Classification
Tracking
20. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Strategic
Trapdoors (Backdoors) (Maintenance Hooks)
Disk Mirroring
Protection
21. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
Administrative Access Controls
Maximum Tolerable Downtime (MTD)
Surge
22. A record that must be preserved and available for retrieval if needed.
Database Shadowing
Encapsulation
BCP Testing Drills and Exercises
Vital Record
23. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Policy
Authentication
Keyed-Hashing For Message Authentication
Embedded Systems
24. To evaluate the current situation and make basic decisions as to what to do
Entrapment
Safeguard
Triage
File
25. Searching for wireless networks in a moving car.
Wait
War Driving
Wireless Fidelity (Wi-Fi )
Cross Certification
26. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Structured Walk-Through Test
Masquerading
Chain of Custody
Checksum
27. Firewalls - encryption - and access control lists
Examples of technical security components
Tapping
Checklist Test
Pervasive Computing and Mobile Computing Devices
28. The level and label given to an individual for the purpose of compartmentalization
Incident Response
Security Clearance
CobiT
TEMPEST
29. Control type- that is communication based - typically written or oral
Teardrop
Administrative
Decipher
Plan Maintenance Procedures
30. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Identification
Restoration
TCSEC (Orange Book)
Open Mail Relay Servers
31. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Virtual Memory
Data Backups
Surveillance
Concentrator
32. Using small special tools all tumblers of the lock are aligned - opening the door
Inheritance
Databases
Picking
Object
33. Natural occurrence in circuits that are in close proximity
Encapsulation
Interference (Noise)
Assembler
Checklist Test
34. Uses two or more legal systems
Control
Mixed Law System
Kernel
IP Address Spoofing
35. Third party processes used to organize the implementation of an architecture
Executive Succession
Threats
Information Flow Model
Framework
36. Hiding the fact that communication has occurred
Steganography
Concatenation
Technical Access Controls
Strong Authentication
37. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Civil Law
System Life Cycle
Common Law
Checklist Test (desk check)
38. Indivisible - data field must contain only one value that either all transactions take place or none do
Atomicity
Storage Area Network (SAN)
Data Backup Strategies
Distributed Denial Of Service
39. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Concatenation
Class
Test Plan
Cross-Site Scripting
40. A process state - to be executing a process on the CPU
Running
Residual Risk
Redundant Servers
Spiral
41. Disruption of operation of an electronic device due to a competing electromagnetic field.
Convincing
EMI
Side Channel Attack
5 Rules Of Evidence
42. Intellectual property protection for an invention
Time Of Check/Time Of Use
Inrush Current
Noise
Patent
43. Of a system without prior knowledge by the tester or the tested
Masked/Interruptible
Contact List
Chain Of Custody
Double Blind Testing
44. Those who initiate the attack
Contingency Plan
Threat Agent
Inference
Atomicity
45. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
Education
Access Control Lists
Residual Risk
46. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Full Test (Full Interruption)
Kerckhoff's Principle
Executive Succession
Administrative Access Controls
47. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Business Interruption Insurance
CobiT
Restoration
Modification
48. A planned or unplanned interruption in system availability.
System Downtime
JPEG (Joint Photographic Experts Group)
Business Impact Assessment (BIA)
Cold Site
49. An event which stops business from continuing.
Marking
Asymmetric
Disaster
Public Key Infrastructure (PKI)
50. Another subject cannot see an ongoing or pending update until it is complete
EMI
Dictionary Attack
Denial Of Service
Isolation
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests