SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An unintended communication path
Degauss
Covert Channel
Microwave
Multilevel Security System
2. Moving the alphabet intact a certain number spaces
Collisions
JPEG (Joint Photographic Experts Group)
Shift Cipher (Caesar)
On-Site
3. OOP concept of a class's details to be hidden from object
Remote Journaling
Encapsulation
Pointer
Modification
4. Responsibility of a user for the actions taken by their account which requires unique identification
Open Mail Relay Servers
Masked/Interruptible
Civil Law
Accountability
5. A device that sequentially switches multiple analog inputs to the output.
Quantitative
Classification
Detective
Multiplexers
6. Recognition of an individual's assertion of identity.
Identification
Business Recovery Team
Asymmetric
Binary
7. Recovery alternative which includes cold site and some equipment and infrastructure is available
Administrative Law
ITSEC
Warm Site
Crisis
8. A disturbance that degrades performance of electronic devices and electronic communications.
Life Cycle of Evidence
Administrative Laws
Key Escrow
Radio Frequency Interference (RFI)
9. A secure connection to another network.
Central Processing Unit (CPU)
Electrostatic Discharge
Gateway
Fire Prevention
10. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.
Honeynet
Legacy Data
Damage Assessment
Denial Of Service
11. A layer 3 device that used to connect two or more network segments and regulate traffic.
Processes are Isolated By
Resumption
Routers
Kernel
12. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
File Extension
Data Backups
Residual Risk
Compartmentalize
13. Real-time - automatic and transparent backup of data.
Admissible
Recovery Period
Remote Journaling
Business Continuity Steering Committee
14. Renders the record inaccessible to the database management system
Record Level Deletion
Residual Risk
Consistency
Criminal Law
15. Pertaining to law - verified as real
Non-Discretionary Access Control
Authentic
Data Dictionary
Shadowing (file shadowing)
16. Act of luring an intruder and is legal.
Attacker (Black hat - Hacker)
Plain Text
Incident Response Team
Enticement
17. A protocol for the efficient transmission of voice over the Internet
Malformed Input
Code
Tort
Voice Over IP (VOIP)
18. Tool which mediates access
False Negative
Control
Smurf
Byte
19. What is will remain - persistence
Multi-Party Control
Decipher
Orange Book C2 Classification
Durability
20. Written suggestions that direct choice to a few alternatives
Guidelines
Site Policy Awareness
Rollback
Admissible
21. A world-wide wireless technology
Cross Training
Checklist Test
Wireless Fidelity (Wi-Fi )
Restoration
22. Can be statistical (monitor behavior) or signature based (watch for known attacks)
War Driving
Emergency Operations Center (EOC)
IDS Intrusion Detection System
Masquerading
23. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Warm Site
Compensating
Data Backup Strategies
Classification
24. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Distributed Denial Of Service
Civil Or Code Law
Business Recovery Team
Bollard
25. A backup type - for databases at a point in time
Blind Testing
Source Routing Exploitation
Cipher Text
Shadowing (file shadowing)
26. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.
Data Leakage
Physical Tampering
Authentic
Countermeasure
27. Unsolicited commercial email
Cryptology
ff Site
Checksum
Spam
28. Interception of a communication session by an attacker.
Archival Data
Internal Use Only
Hijacking
Restoration
29. Define the way in which the organization operates.
Total Risk
Executive Succession
Brouter
Proprietary
30. Written step-by-step actions
Resumption
Procedure
Bridge
Operational Test
31. DoS - Spoofing - dictionary - brute force - wardialing
SYN Flooding
Tracking
Key Clustering
Access Control Attacks
32. A one way - directed graph which indicates confidentiality or integrity flow
War Dialing
Masquerading
Lattice
Orange Book B1 Classification
33. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.
Overlapping Fragment Attack
Pervasive Computing and Mobile Computing Devices
Interpreter
Patch Panels
34. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management
Business Impact Analysis
Disaster
Strong Authentication
Access Control Matrix
35. Mitigate damage by isolating compromised systems from the network.
Brownout
Incident
2-Phase Commit
Containment
36. One way encryption
HTTP Response Splitting
Sharing
Hash Function
Alternate Data Streams (File System Forks)
37. Communicate to stakeholders
Threat Agent
Worldwide Interoperability for Microwave Access (WI-MAX )
Storage Area Network (SAN)
Debriefing/Feedback
38. Data or interference that can trigger a false positive
Noise
System Downtime
Multi-Processing
Access Control Lists
39. To know more than one job
Denial Of Service
Cross Training
Burn
Security Clearance
40. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Security Domain
Masked/Interruptible
Data Integrity
Fraggle
41. For PKI - to store another copy of a key
Burn
Key Escrow
Trapdoors (Backdoors) (Maintenance Hooks)
Technical Access Controls
42. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Shielding
Prevention
Cipher Text
Distributed Processing
43. A state for operating system tasks only
Open Mail Relay Servers
Preemptive
Supervisor Mode (monitor - system - privileged)
CobiT
44. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Algorithm
BCP Testing Drills and Exercises
On-Site
Processes are Isolated By
45. A planned or unplanned interruption in system availability.
System Downtime
Strategic
Compiler
Worm
46. A test conducted on one or more components of a plan under actual operating conditions.
Operational Test
False Attack Stimulus
Full-Interruption test
Mobile Recovery
47. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Authorization
Internal Use Only
Rollback
Failure Modes and Effect Analysis (FEMA)
48. Deals with discretionary protection
Interference (Noise)
Data Backups
Orange Book C Classification
Hot Site
49. A description of a database
Database Shadowing
Data Dictionary
Encryption
Logic Bomb
50. Encryption system using shared key/private key/single key/secret key
Directive
Symmetric
Standalone Test
Work Factor
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests