SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The connection between a wireless and wired network.
Interception
Hub
Privacy Laws
Access Point
2. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Chain of Custody
Memory Management
State Machine Model
Hearsay
3. Location to perform the business function
Privacy Laws
Operational Impact Analysis
Tapping
Alternate Site
4. An encryption method that has a key as long as the message
Guidelines
Operational
Running Key
Database Replication
5. Power surge
Entrapment
The ACID Test
Electrostatic Discharge
Instance
6. To segregate for the purposes of labeling
Twisted Pair
Slack Space
Compartmentalize
The ACID Test
7. Recovery alternative which includes cold site and some equipment and infrastructure is available
Surge
Incident Response
Warm Site
Atomicity
8. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Executive Succession
Common Law
Fault
Operating
9. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Certificate Revocation List (CRL)
Cross Certification
Territoriality
Interception
10. Record history of incident
Multilevel Security System
Microwave
Tracking
Access Control Lists
11. People protect their domain
Legacy Data
Territoriality
Source Routing Exploitation
Business Continuity Planning (BCP)
12. Less granular organization of controls -
Redundant Array Of Independent Drives (RAID)
Control Type
Blackout
Fire Prevention
13. Intermediate level - pertaining to planning
Patch Management
Mantrap (Double Door System)
Operational
Side Channel Attack
14. Mathematical function that determines the cryptographic operations
Algorithm
Liability
Security Domain
Administrative Law
15. Pertaining to law - accepted by a court
TEMPEST
Reference Monitor
Admissible
Threat Agent
16. An alert or alarm that is triggered when no actual attack has taken place
Conflict Of Interest
Access Control Attacks
Payload
False (False Positive)
17. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
Privacy Laws
Top Secret
Administrative
TEMPEST
18. Code making
Cryptography
Key Clustering
Orange Book B1 Classification
Threat Agent
19. A database backup type which records at the transaction level
Administrative Access Controls
Remote Journaling
Entrapment
Information Owner
20. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Primary Storage
Fraggle
Data Custodian
Business Interruption
21. A description of a database
Object
Firewalls
Data Dictionary
Data Custodian
22. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Burn
Compiler
Detective
Incident Response
23. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Trojan Horse
Cryptology
Total Risk
Orange Book D Classification
24. A unit of execution
Remote Journaling
Threads
Brute Force
Incident Handling
25. Pertaining to law - lending it self to one side of an argument
Deterrent
Call Tree
Operational Test
Convincing
26. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Object Oriented Programming (OOP)
Fault
Fault Tolerance
Due Care
27. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Business Unit Recovery
EMI
Mirroring
Total Risk
28. A record that must be preserved and available for retrieval if needed.
Orange Book A Classification
Vital Record
Lattice
Accreditation
29. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.
Method
Hijacking
Alert/Alarm
Operational Impact Analysis
30. Converts a high level language into machine language
Assembler
Structured Walkthrough
Prevention
ff Site
31. The guardian of asset(s) - a maintenance activity
User
Containment
Custodian
Honeypot
32. Try a list of words in passwords or encryption keys
Birthday Attack
Switches
Dictionary Attack
Security Domain
33. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.
Fault
Restoration
Data Backup Strategies
Multilevel Security System
34. Is secondhand and usually not admissible in court
Hearsay Evidence
Basics Of Secure Design
Noise
Targeted Testing
35. Event(s) that cause harm
Incident
Fault Tolerance
Proprietary
Residual Risk
36. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Metadata
Forensic Copy
ITSEC
Archival Data
37. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
File Shadowing
Near Site
Infrastructure
Remanence
38. Subset of operating systems components dedicated to protection mechanisms
Encapsulation
Legacy Data
Security Kernel
Investigation
39. An individuals conduct that violates government laws developed to protect the public
Cross-Site Scripting
Criminal Law
File Sharing
Quantitative
40. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs
Mock Disaster
Dictionary Attack
Application Programming Interface
Remote Access Trojan
41. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Tactical
Information Risk Management (IRM)
Discretionary
Recovery
42. A temporary public file to inform others of a compromised digital certificate
Concatenation
Certificate Revocation List (CRL)
Countermeasure
Radio Frequency Interference (RFI)
43. Malware that subverts the detective controls of an operating system
Disk Mirroring
SQL Injection
Rootkit
Safeguard
44. An availability attack - to consume resources to the point of exhaustion
Denial Of Service
Hash Function
Encipher
Forward Recovery
45. An event which stops business from continuing.
Disaster
Service Bureau
Threat Agent
Asymmetric
46. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Sampling
Deletion
Full-Interruption test
Highly Confidential
47. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Algorithm
Honeynet
Remanence
Change Control
48. Line by line translation from a high level language to machine code
Interpreter
Full-Interruption test
Journaling
Contingency Plan
49. Hiding the fact that communication has occurred
Orange Book B1 Classification
Steganography
Redundant Servers
Business Interruption
50. A set of laws that the organization agrees to be bound by
3 Types of harm Addressed in computer crime laws
Time Of Check/Time Of Use
Administrative Law
Botnet
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests