SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Database Shadowing
Lattice
Analysis
Prevention
2. Uncleared buffers or media
Object Reuse
Incident Response
Orange Book D Classification
Codec
3. Of a system without prior knowledge by the tester or the tested
Trapdoors (Backdoors) (Maintenance Hooks)
Double Blind Testing
Remote Journaling
Wireless Fidelity (Wi-Fi )
4. Line by line translation from a high level language to machine code
Quantitative
Checksum
JPEG (Joint Photographic Experts Group)
Interpreter
5. Code making
Cryptography
Worm
Quantitative Risk Analysis
3 Types of harm Addressed in computer crime laws
6. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Blackout
Detection
Information Risk Management (IRM)
Packet Filtering
7. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Concatenation
Radio Frequency Interference (RFI)
Masked/Interruptible
Classification Scheme
8. Using many alphabets
Polyalphabetic
Architecture
Framework
Common Criteria
9. Control category- to give instructions or inform
Exercise
Directive
Service Bureau
Multilevel Security System
10. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
Deadlock
Mirroring
Copyright
Teardrop
11. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Supervisor Mode (monitor - system - privileged)
Incident Response
Residual Data
Denial Of Service
12. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
E-Mail Spoofing
BCP Testing Drills and Exercises
Technical Access Controls
Lattice
13. System of law based upon what is good for society
Secondary Storage
Fire Prevention
Kernel
Civil Or Code Law
14. Subjects will not interact with each other's objects
Faraday Cage/ Shield
Firmware
Inrush Current
Non-Interference
15. Program instructions based upon the CPU's specific architecture
Physical Tampering
Machine Language (Machine Code)
Blind Testing
Multi-Processing
16. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?
Cross-Site Scripting
Full Test (Full Interruption)
Disk Mirroring
Bumping
17. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk
Private Branch Exchange (PBX)
Cryptology
Residual Risk
Critical Records
18. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
CobiT
Cross Training
Certificate Revocation List (CRL)
Redundant Array Of Independent Drives (RAID)
19. Summary of a communication for the purpose of integrity
Codec
Cross Training
Message Digest
File Level Deletion
20. Binary decision by a system of permitting or denying access to the entire system
Cryptology
Authentication
Multi-Party Control
Log
21. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.
Classification
File Extension
Desk Check Test
Structured Walk-Through Test
22. An availability attack - to consume resources to the point of exhaustion
Integrated Test
Full Test (Full Interruption)
Denial Of Service
Deletion
23. A failure of an IDS to detect an actual attack
Disaster Recovery Tape
False Negative
Custodian
Pervasive Computing and Mobile Computing Devices
24. Reduces causes of fire
Fire Prevention
Declaration
False (False Positive)
CobiT
25. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Risk
DR Or BC Coordinator
Governance
Entrapment
26. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Archival Data
The ACID Test
Directive
Desk Check Test
27. Evidence must be: admissible - authentic - complete - accurate - and convincing
Classification Scheme
5 Rules Of Evidence
Trusted Computing Base
Threat Agent
28. Alerts personnel to the presence of a fire
Domain
Hearsay Evidence
Fire Detection
Voice Over IP (VOIP)
29. Potentially retrievable data residue that remains following intended erasure of data.
Tracking
Full Test (Full Interruption)
Remanence
MOM
30. A device that provides the functions of both a bridge and a router.
Radio Frequency Interference (RFI)
Brouter
Inrush Current
Accreditation
31. Threats x Vulnerability x Asset Value = Total Risk
Mirrored Site
Disaster Recovery Plan
Total Risk
Method
32. Small data warehouse
Alarm Filtering
Message Digest
The ACID Test
Data Marts
33. A subnetwork with storage devices servicing all servers on the attached network.
System Downtime
Rogue Access Points
Storage Area Network (SAN)
TCSEC (Orange Book)
34. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability
Acronym for American Standard Code for Information Interchange (ASCII)
The ACID Test
Countermeasure
Operational Exercise
35. Calculation encompassing threats - vulnerabilities and assets
Total Risk
Structured Walkthrough
Common Criteria
Bollard
36. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.
Safeguard
UPS
Access Point
Network Attached Storage (NAS)
37. Moving the alphabet intact a certain number spaces
Metadata
Shift Cipher (Caesar)
Processes are Isolated By
DR Or BC Coordinator
38. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Life Cycle of Evidence
Recovery Period
Buffer Overflow
Acronym for American Standard Code for Information Interchange (ASCII)
39. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Content Dependent Access Control
Custodian
Elements of Negligence
Internal Use Only
40. Lower frequency noise
Radio Frequency Interference (RFI)
Analysis
TCSEC (Orange Book)
Tort
41. Mediation of subject and object interactions
Governance
Labeling
True Attack Stimulus
Access Control
42. Sphere of influence
Burn
Control Category
Separation Of Duties
Domain
43. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Full Test (Full Interruption)
3 Types of harm Addressed in computer crime laws
IP Fragmentation
Honeypot
44. To reduce fire
Risk Assessment / Analysis
Fire Suppression
Patch Management
Vital Record
45. Malware that makes many small changes over time to a single data point or system
Simulation Test
Data Dictionary
Walk Though
Salami
46. Natural or human-readable form of message
On-Site
Plain Text
Walk Though
Preemptive
47. Mathematical function that determines the cryptographic operations
Algorithm
Alternate Data Streams (File System Forks)
Enticement
Source Routing Exploitation
48. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Exercise
The ACID Test
Business Recovery Team
Transients
49. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Procedure
File Shadowing
Key Management
ISO/IEC 27001
50. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Compiler
Quantitative
Mission-Critical Application
Business Continuity Steering Committee
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests