SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.
Data Recovery
Trapdoors (Backdoors) (Maintenance Hooks)
Prevention
Service Bureau
2. A planned or unplanned interruption in system availability.
Governance
Recovery Strategy
System Downtime
Masquerading
3. Potentially compromising leakage of electrical or acoustical signals.
Blind Testing
Certification Authority
Emanations
Job Training
4. Reduces causes of fire
ff Site
Simulation Test
Kerberos
Fire Prevention
5. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Data Leakage
Territoriality
Failure Modes and Effect Analysis (FEMA)
MOM
6. A collection of data or information that has a name
Data Warehouse
Durability
Elements of Negligence
File
7. Moving letters around
Chain of Custody
Permutation /Transposition
Non-Repudiation
Kernel
8. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Spiral
Common Law
Test Plan
Trademark
9. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
System Life Cycle
Security Blueprint
Surge Suppressor
Plain Text
10. OOP concept of an object at runtime
Trojan Horse
Threats
Metadata
Instance
11. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Liability
Application Programming Interface
Electrostatic Discharge
Degauss
12. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.
Due Diligence
Certification
Information Technology Security Evaluation Criteria - ITSEC
State Machine Model
13. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Birthday Attack
Key Clustering
Governance
Desk Check Test
14. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Computer Forensics
Noise
Pointer
Security Kernel
15. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
Classification
Orange Book C Classification
Vital Record
Maximum Tolerable Downtime (MTD)
16. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Near Site
TEMPEST
Application Programming Interface
5 Rules Of Evidence
17. The problems solving state - the opposite of supervisor mode
Interference (Noise)
Transients
Voice Over IP (VOIP)
User Mode (problem or program state)
18. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Public Key Infrastructure (PKI)
Spam
Computer Forensics
Eavesdropping
19. May be responsible for overall recovery of an organization or unit(s).
DR Or BC Coordinator
E-Mail Spoofing
Record Level Deletion
Relocation
20. Unsolicited commercial email
Damage Assessment
Spam
Tactical
Cipher Text
21. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
File Extension
Central Processing Unit (CPU)
Incident Handling
Reciprocal Agreement
22. Potential danger to information or systems
Eavesdropping
Threats
Quantitative
Checkpoint
23. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Mirrored Site
Redundant Servers
Critical Records
Civil Or Code Law
24. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.
Injection
Warm Site
Patch Management
False Attack Stimulus
25. Scrambled form of the message or data
Cipher Text
Shadowing (file shadowing)
System Life Cycle
Virtual Memory
26. A Trojan horse with the express underlying purpose of controlling host from a distance
Rogue Access Points
Remote Access Trojan
Fire Prevention
Workaround Procedures
27. Converts a high level language into machine language
Shadowing (file shadowing)
Hot Site
Trusted Computing Base
Assembler
28. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Orange Book B2 Classification
Electromagnetic Interference (EMI)
Off-Site Storage
High-Risk Areas
29. A layer 2 device that used to connect two or more network segments and regulate traffic.
Routers
Switches
Relocation
Quantitative
30. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Metadata
Degauss
Data Backup Strategies
Concentrator
31. Threats x Vulnerability x Asset Value = Total Risk
Total Risk
Complete
Key Clustering
Data Backup Strategies
32. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Domain
Evidence
Checkpoint
Race Condition
33. A computer designed for the purpose of studying adversaries
Spyware
Common Law
Honeypot
Tort
34. Less granular organization of controls -
Control Type
Interference (Noise)
Proxies
Recovery Strategy
35. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Framework
False (False Positive)
Information Risk Management (IRM)
Debriefing/Feedback
36. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys
Warm Site
Kerberos
Firewalls
Network Attached Storage (NAS)
37. Independent malware that requires user interaction to execute
Privacy Laws
Locard's Principle
Virus
On-Site
38. System of law based upon what is good for society
Civil Or Code Law
Information Flow Model
Business Impact Analysis
Site Policy Awareness
39. Individuals and departments responsible for the storage and safeguarding of computerized data.
Waterfall
Data Custodian
Uninterruptible Power Supply (UPS)
Vulnerability
40. Subject based description of a system or a collection of resources
Assembler
Operational Exercise
Capability Tables
Threads
41. Renders the record inaccessible to the database management system
Highly Confidential
5 Rules Of Evidence
Record Level Deletion
2-Phase Commit
42. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Sharing
Architecture
Operational Impact Analysis
Public Key Infrastructure (PKI)
43. To start business continuity processes
Quantitative
System Downtime
Activation
Job Rotation
44. Asymmetric encryption of a hash of message
Strong Authentication
Containment
Radio Frequency Interference (RFI)
Digital Signature
45. To evaluate the current situation and make basic decisions as to what to do
Job Training
Chain Of Custody
Triage
Privacy Laws
46. The partial or full duplication of data from a source database to one or more destination databases.
Database Replication
Boot (V.)
Uninterruptible Power Supply (UPS)
Covert Channel
47. A state where two subjects can access the same object without proper mediation
Race Condition
Backup
Policy
Wireless Fidelity (Wi-Fi )
48. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Risk
Qualitative
Kernel
Archival Data
49. A collection of information designed to reduce duplication and increase integrity
Databases
Content Dependent Access Control
Mantrap (Double Door System)
ITSEC
50. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
Business Interruption Insurance
Security Blueprint
Man-In-The-Middle Attack
Incident
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests