SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Evidence must be: admissible - authentic - complete - accurate - and convincing
Adware
Remote Access Trojan
Object Reuse
5 Rules Of Evidence
2. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Vital Record
Administrative Laws
Mobile Site
Simulation
3. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.
TCSEC (Orange Book)
Logic Bomb
Bit
Keyed-Hashing For Message Authentication
4. Recovery alternative which outsources a business function at a cost
Collisions
Spiral
Service Bureau
Threat Agent
5. Deals with discretionary protection
Orange Book C Classification
Kerberos
Attacker (Black hat - Hacker)
Running Key
6. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Process Isolation
Prevention
Checklist Test (desk check)
Business Interruption
7. Vehicle stopping object
Mandatory
Bollard
Class
File Shadowing
8. Initial surge of current
Guidelines
On-Site
Cryptography
Inrush Current
9. Final purpose or result
File Extension
Payload
Restoration
Multi-Tasking
10. A Denial of Service attack that floods the target system with connection requests that are not finalized.
Running
SYN Flooding
Locard's Principle
Hacker
11. Security policy - procedures - and compliance enforcement
Running Key
Transients
Satellite
Examples of non-technical security components
12. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Standalone Test
Code
Electronic Vaulting
Liability
13. Control type- that is communication based - typically written or oral
Administrative
Kerberos
Double Blind Testing
Man-In-The-Middle Attack
14. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
HTTP Response Splitting
Authentic
Complete
Cross-Site Scripting
15. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid
Critical Functions
Patent
Polymorphism
Civil Law
16. A one way - directed graph which indicates confidentiality or integrity flow
Analysis
Lattice
Operating
Warm Site
17. Intellectual property protection for marketing efforts
Recovery
Trademark
War Driving
Authentic
18. A physical enclosure for verifying identity before entry to a facility
Mantrap (Double Door System)
Machine Language (Machine Code)
Accountability
Physical Tampering
19. Two different keys decrypt the same cipher text
Key Clustering
Orange Book C Classification
Remote Access Trojan
Integrated Test
20. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Spyware
Shielding
Resumption
Security Clearance
21. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Analysis
Warm Site
Distributed Denial Of Service
Administrative
22. OOP concept of a distinct copy of the class
Authentication
Object
Threads
Information Owner
23. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. Continuous surveillance - to provide for detection and response of any failure in preventive controls.
Mirroring
Monitor
Database Replication
Keyed-Hashing For Message Authentication
25. Controls deployed to avert unauthorized and/or undesired actions.
Multiplexers
Waterfall
Tapping
Prevention
26. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Degauss
DR Or BC Coordinator
Deletion
27. Control category- to give instructions or inform
Orange Book A Classification
IDS Intrusion Detection System
Directive
Threads
28. Recovery alternative - a building only with sufficient power - and HVAC
Safeguard
Mirrored Site
Cold Site
Territoriality
29. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Encapsulation
Moore's Law
Key Clustering
Multi-Programming
30. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Disaster
Centralized Access Control Technologies
Redundant Array Of Independent Drives (RAID)
Common Criteria
31. Collection of data on business functions which determines the strategy of resiliency
Business Impact Assessment (BIA)
Critical Infrastructure
Encapsulation
File Level Deletion
32. Try a list of words in passwords or encryption keys
Dictionary Attack
Reciprocal Agreement
UPS
Trapdoors (Backdoors) (Maintenance Hooks)
33. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
3 Types of harm Addressed in computer crime laws
Structured Walkthrough
Disaster
Technical Access Controls
34. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Mission-Critical Application
SYN Flooding
Corrective
Data Backups
35. A state for operating system tasks only
Guidelines
Simulation Test
Supervisor Mode (monitor - system - privileged)
Radio Frequency Interference (RFI)
36. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. Code breaking - practice of defeating the protective properties of cryptography.
Critical Records
Cryptanalysis
Repeaters
Operational Impact Analysis
38. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Marking
Encryption
Simulation Test
Administrative Laws
39. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Data Backup Strategies
Centralized Access Control Technologies
Failure Modes and Effect Analysis (FEMA)
Uninterruptible Power Supply (UPS)
40. A copy of transaction data - designed for querying and reporting
Policy
Data Warehouse
Adware
Coaxial Cable
41. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Stopped
Mandatory Access Control (MAC)
ff Site
Risk
42. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
Electronic Vaulting
Damage Assessment
Security Kernel
Key Space
43. Evaluation of a system without prior knowledge by the tester
Blind Testing
Code
Safeguard
Access Control
44. Location where coordination and execution of BCP or DRP is directed
SQL Injection
Notification
Network Attached Storage (NAS)
Emergency Operations Center (EOC)
45. For PKI - decertify an entities certificate
Security Blueprint
Revocation
Disk Mirroring
False (False Positive)
46. Mitigation of system or component loss or interruption through use of backup capability.
Keyed-Hashing For Message Authentication
Sharing
False Negative
Fault Tolerance
47. A choice in risk management - to implement a control that limits or lessens negative effects
Cryptovariable
Mitigate
Civil Or Code Law
Operational Impact Analysis
48. Asymmetric encryption of a hash of message
Copyright
Fire Prevention
Exposure
Digital Signature
49. System mediation of access with the focus on the context of the request
Fault Tolerance
Rootkit
Surge
Content Dependent Access Control
50. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Fraggle
Bumping
Incident Manager
Tactical
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests