SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Act of luring an intruder and is legal.
Debriefing/Feedback
Control Type
Durability
Enticement
2. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Object
Discretionary Access Control (DAC)
Fire Detection
Separation Of Duties
3. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Confidence Value
Checkpoint
Tar Pits
Kernel
4. Initial surge of current
Cross Training
Incident Handling
Binary
Inrush Current
5. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Mission-Critical Application
Fraggle
Central Processing Unit (CPU)
Repeaters
6. An asymmetric cryptography mechanism that provides authentication.
Hearsay
Digital Signature
ITSEC
Modems
7. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services
Access Control Lists
Hot Site
Recovery
Inheritance
8. Lower frequency noise
Compiler
Radio Frequency Interference (RFI)
Multilevel Security System
Operational Impact Analysis
9. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
False Negative
Countermeasure
Reference Monitor
Residual Risk
10. The problems solving state - the opposite of supervisor mode
Surveillance
Emergency
Fire Detection
User Mode (problem or program state)
11. To jump to a conclusion
Inference
Access Control Matrix
Alert
Infrastructure
12. The chance that something negative will occur
Custodian
ISO/IEC 27001
Risk
CPU Cache
13. Abstract and mathematical in nature - defining all possible states - transitions and operations
Key Escrow
State Machine Model
Data Warehouse
Cache
14. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.
Remote Journaling
Watermarking
Twisted Pair
Criminal Law
15. Mediation of covert channels must be addressed
Information Flow Model
Race Condition
Critical Records
On-Site
16. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?
Walk Though
Security Blueprint
Alarm Filtering
Cipher Text
17. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
UPS
Replication
Administrative Law
Business Interruption Insurance
18. Pertaining to law - accepted by a court
CPU Cache
Capability Tables
Cross Certification
Admissible
19. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Orange Book B2 Classification
Database Shadowing
Infrastructure
Phishing
21. A backup of data located where staff can gain access immediately
Mantrap (Double Door System)
Due Care
Object
On-Site
22. Define the way in which the organization operates.
Vulnerability
Proprietary
Accountability
Plan Maintenance Procedures
23. Owner directed mediation of access
Workaround Procedures
Encapsulation
Virtual Memory
Discretionary
24. A subnetwork with storage devices servicing all servers on the attached network.
Exercise
Storage Area Network (SAN)
Archival Data
Operating
25. Encryption system using shared key/private key/single key/secret key
Symmetric
Liability
5 Rules Of Evidence
Data Dictionary
26. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Orange Book C2 Classification
Access Control Lists
Electromagnetic Interference (EMI)
Ring Protection
27. Weak evidence
Hearsay
Satellite
Orange Book D Classification
Business Interruption Insurance
28. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Burn
Orange Book D Classification
Metadata
Civil Or Code Law
29. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
Operational
Algorithm
Disaster Recovery Teams (Business Recovery Teams)
Storage Area Network (SAN)
30. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.
Hijacking
Contact List
Access Point
Examples of technical security components
31. Small data warehouse
Data Marts
Source Routing Exploitation
Botnet
3 Types of harm Addressed in computer crime laws
32. Code making
Shadowing (file shadowing)
Cryptography
Tracking
Compression
33. An alert or alarm that is triggered when no actual attack has taken place
Information Risk Management (IRM)
False (False Positive)
Recovery Period
Threats
34. A program with an inappropriate second purpose
Criminal Law
Trojan Horse
Tort
Restoration
35. Controls for logging and alerting
Intrusion Detection Systems
Cookie
Risk Mitigation
Analysis
36. Malware that subverts the detective controls of an operating system
Recovery
Job Rotation
Technical Access Controls
Rootkit
37. High level design or model with a goal of consistency - integrity - and balance
Administrative Law
Architecture
Multiplexers
Process Isolation
38. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Critical Infrastructure
Business Recovery Timeline
Privacy Laws
Warm Site
39. OOP concept of a distinct copy of the class
Object
Discretionary
Examples of technical security components
Incident
40. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Monitor
Orange Book B2 Classification
Structured Walkthrough
Relocation
41. To know more than one job
Hacker
Workaround Procedures
Mandatory Vacations
Cross Training
42. Converts a high level language into machine language
Assembler
Teardrop
Containment
5 Rules Of Evidence
43. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.
File Shadowing
Orange Book A Classification
Trade Secret
Journaling
44. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Threats
Data Backups
Machine Language (Machine Code)
Recovery
45. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Data Recovery
Firewalls
Parallel Test
Structured Walkthrough
46. Two different keys decrypt the same cipher text
Key Clustering
Legacy Data
Residual Data
Liability
47. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
EMI
War Driving
Information Risk Management (IRM)
Orange Book A Classification
48. High frequency noise
False Negative
Keystroke Logging
Adware
Electromagnetic Interference (EMI)
49. Effort/time needed to overcome a protective measure
Targeted Testing
Bumping
Lattice
Work Factor
50. Business and technical process of applying security software updates in a regulated periodic way
Access Control Lists
Accreditation
Patch Management
Memory Management
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests