SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization
Disaster Recovery Plan
Business Continuity Planning (BCP)
Domain
Reciprocal Agreement
2. A subnetwork with storage devices servicing all servers on the attached network.
Brouter
Storage Area Network (SAN)
ITSEC
Bit
3. With enough computing power trying all possible combinations
Territoriality
Brute Force
Tactical
Failure Modes and Effect Analysis (FEMA)
4. Binary decision by a system of permitting or denying access to the entire system
Authentication
Injection
Multi-Processing
Alert/Alarm
5. Highest level of authority at EOC with knowledge of the business process and the resources available
Injection
Object
Incident Manager
CobiT
6. The one person responsible for data - its classification and control setting
Plaintext
Information Owner
Surveillance
Incident Response
7. Scrambled form of the message or data
Cryptography
Full Test (Full Interruption)
Digital Signature
Cipher Text
8. Representatives from each functional area or department get together and walk through the plan from beginning to end.
Contingency Plan
Structured Walk-Through Test
Key Clustering
Data Hiding
9. A choice in risk management - to convince another to assume risk - typically by payment
Legacy Data
Alternate Data Streams (File System Forks)
Remanence
Transfer
10. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
Parallel Test
Threats
Firewalls
11. Malware that subverts the detective controls of an operating system
Administrative Laws
False Negative
Interpreter
Rootkit
12. Written core statements that rarely change
Steganography
Policy
Gateway
Debriefing/Feedback
13. Hardware or software that is part of a larger system
Radio Frequency Interference (RFI)
Damage Assessment
Embedded
Fire Prevention
14. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.
Off-Site Storage
Picking
Examples of technical security components
Quantitative Risk Analysis
15. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Evidence
Burn
Remote Journaling
Incident Response
16. Intellectual property protection for an invention
Patent
Strong Authentication
Burn
Certificate Revocation List (CRL)
17. A Denial of Service attack that floods the target system with connection requests that are not finalized.
Full Test (Full Interruption)
Primary Storage
War Driving
SYN Flooding
18. OOP concept of an object's abilities - what it does
Cipher Text
Contact List
Uninterruptible Power Supply (UPS)
Method
19. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Generator
Computer System Evidence
Mitigate
Simulation
20. Security policy - procedures - and compliance enforcement
Business Unit Recovery
Warm Site
Examples of non-technical security components
Disk Mirroring
21. Requirement of access to data for a clearly defined purpose
Recovery
Need-To-Know
Virus
Fault Tolerance
22. Organized group of compromised computers
Preemptive
Botnet
Malformed Input
Risk Mitigation
23. An attack involving the hijacking of a TCP session by predicting a sequence number.
Key Clustering
Sequence Attacks
Trusted Computing Base
Tracking
24. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Fire Suppression
Incident Handling
Acronym for American Standard Code for Information Interchange (ASCII)
Multi-Programming
25. Alerts personnel to the presence of a fire
TNI (Red Book)
Fire Detection
Machine Language (Machine Code)
Due Diligence
26. A backup of data located where staff can gain access immediately
Fraggle
On-Site
File Sharing
Data Recovery
27. Controls for termination of attempt to access object
Intrusion Prevention Systems
Plaintext
Privacy Laws
Source Routing Exploitation
28. High level design or model with a goal of consistency - integrity - and balance
Authorization
Architecture
Buffer Overflow
5 Rules Of Evidence
29. Policy or stated actions
Framework
Due Care
Log
Attacker (Black hat - Hacker)
30. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Forensic Copy
Call Tree
Business Recovery Team
False Attack Stimulus
31. Recovery alternative - short-term - high cost movable processing location
Entrapment
Data Backup Strategies
Assembler
Mobile Site
32. Recovery alternative which includes cold site and some equipment and infrastructure is available
Intrusion Detection Systems
Cryptovariable
Warm Site
Administrative Laws
33. Controls for logging and alerting
Intrusion Detection Systems
Guidelines
Detection
Covert Channel
34. RADIUS - TACACS+ - Diameter
Centralized Access Control Technologies
Protection
Digital Signature
Restoration
35. Written step-by-step actions
Salami
Examples of technical security components
Gateway
Procedure
36. Planning with a goal of returning to the normal business function
Restoration
Checklist Test (desk check)
Operating
Procedure
37. The core of a computer that calculates
Recovery
Custodian
Access Control Lists
Central Processing Unit (CPU)
38. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Encapsulation
Buffer Overflow
Kerberos
Memory Management
39. An asymmetric cryptography mechanism that provides authentication.
Deletion
Debriefing/Feedback
Digital Signature
Bridge
40. An individuals conduct that violates government laws developed to protect the public
File Server
Authentic
Control Type
Criminal Law
41. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. A failure of an IDS to detect an actual attack
Incident Response
False Negative
Distributed Denial Of Service
Isolation
43. A documented battle plan for coordinating response to incidents.
Reference Monitor
Incident Handling
DR Or BC Coordinator
Confidence Value
44. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Recovery
Phishing
Distributed Processing
ITSEC
45. Transaction controls for a database - a return to a previous state
Key Escrow
Mandatory
Brownout
Rollback
46. An event which stops business from continuing.
Disaster
Key Management
Mobile Recovery
Blind Testing
47. To assert or claim credentialing to an authentication system
Fault Tolerance
Forward Recovery
Identification
Security Kernel
48. A technology that reduces the size of a file.
Worldwide Interoperability for Microwave Access (WI-MAX )
Hijacking
Compression
Kerckhoff's Principle
49. Pertaining to law - verified as real
Virus
HTTP Response Splitting
Asymmetric
Authentic
50. A one way - directed graph which indicates confidentiality or integrity flow
Lattice
Bollard
Prevention
Mobile Site
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests