SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. System of law based upon what is good for society
Warm Site
Civil Or Code Law
On-Site
Orange Book D Classification
2. Interception of a communication session by an attacker.
Digital Certificate
Alternate Data Streams (File System Forks)
Debriefing/Feedback
Hijacking
3. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Blackout
Common Law
Ring Protection
Coaxial Cable
4. A program with an inappropriate second purpose
Trojan Horse
Risk Assessment / Analysis
Data Leakage
Encryption
5. Requirement to take time off
Deadlock
Recovery Point Objective (RPO)
Mandatory Vacations
Threats
6. Granular decision by a system of permitting or denying access to a particular resource on the system
Authorization
Worm
Keystroke Logging
Accurate
7. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Guidelines
BCP Testing Drills and Exercises
Rollback
Business Recovery Team
8. A world-wide wireless technology
Modification
Contingency Plan
Least Privilege
Wireless Fidelity (Wi-Fi )
9. An individuals conduct that violates government laws developed to protect the public
Criminal Law
Symmetric
Data Marts
Spyware
10. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.
Elements of Negligence
Work Factor
Cryptovariable
Pervasive Computing and Mobile Computing Devices
11. Initial surge of current
Inrush Current
Proprietary
Test Plan
Interpreter
12. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Keyed-Hashing For Message Authentication
Tort
ISO/IEC 27001
13. A collection of information designed to reduce duplication and increase integrity
Infrastructure
EMI
Notification
Databases
14. A device that converts between digital and analog representation of data.
Cookie
Modems
Deletion
Custodian
15. Induces a crime - tricks a person - and is illegal
Life Cycle of Evidence
Capability Tables
Entrapment
Threats
16. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
System Downtime
Administrative
Proxies
Business Interruption
17. Effort/time needed to overcome a protective measure
Work Factor
Certificate Revocation List (CRL)
War Driving
IDS Intrusion Detection System
18. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Administrative
Full Test (Full Interruption)
Data Integrity
Recovery Period
19. Asymmetric encryption of a hash of message
Virtual Memory
Fire Prevention
Emergency Procedures
Digital Signature
20. Intellectual property protection for an confidential and critical process
Trade Secret
Trusted Computing Base
Safeguard
Discretionary
21. A mobilized resource purchased or contracted for the purpose of business recovery.
Patent
Mobile Recovery
HTTP Response Splitting
Key Space
22. A subnetwork with storage devices servicing all servers on the attached network.
Storage Area Network (SAN)
Warm Site
Liability
True Attack Stimulus
23. Unauthorized wireless network access device.
Rogue Access Points
Picking
Digital Signature
Fiber Optics
24. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Orange Book C Classification
IP Address Spoofing
Radio Frequency Interference (RFI)
Call Tree
25. OOP concept of an object's abilities - what it does
Hot Site
Firmware
Entrapment
Method
26. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Residual Data
Recovery Time Objectives
Fault Tolerance
Spyware
27. Controls for logging and alerting
System Downtime
Intrusion Detection Systems
Key Clustering
Sampling
28. Control category- to discourage an adversary from attempting to access
Contact List
Deterrent
Elements of Negligence
5 Rules Of Evidence
29. May be responsible for overall recovery of an organization or unit(s).
File
Business Continuity Steering Committee
DR Or BC Coordinator
Chain of Custody
30. Outputs within a given function are the same result
Orange Book D Classification
Collisions
Interpreter
Eavesdropping
31. DoS - Spoofing - dictionary - brute force - wardialing
Containment
Asymmetric
Access Control Attacks
Simulation
32. Intellectual property protection for an invention
False Negative
Accurate
Patent
Codec
33. A test conducted on one or more components of a plan under actual operating conditions.
Orange Book A Classification
Inheritance
Administrative Access Controls
Operational Test
34. Consume resources to a point of exhaustion - loss of availability
Denial Of Service
Content Dependent Access Control
Method
Business Impact Analysis
35. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Kernel
Shift Cipher (Caesar)
Highly Confidential
Chain of Custody
36. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Blind Testing
Man-In-The-Middle Attack
Data Backups
Trade Secret
37. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Watermarking
Electrostatic Discharge
Structured Walkthrough
Algorithm
38. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Operating
Plain Text
ISO/IEC 27001
Business Continuity Planning (BCP)
39. Claiming another's identity at a physical level
Boot (V.)
Standard
Masquerading
Process Isolation
40. The hard drive
Secondary Storage
Fire Detection
Integrated Test
System Downtime
41. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. Binary decision by a system of permitting or denying access to the entire system
Authentication
Contingency Plan
Multi-Party Control
Exposure
43. A state for operating system tasks only
Hot Site
IP Address Spoofing
Due Diligence
Supervisor Mode (monitor - system - privileged)
44. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)
Key Space
HTTP Response Splitting
Switches
Fraggle
45. To set the clearance of a subject or the classification of an object
Labeling
Security Blueprint
Metadata
Non-Repudiation
46. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.
Botnet
Mitigate
Kerckhoff's Principle
Archival Data
47. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.
Alert
Damage Assessment
Fire Classes
Sampling
48. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Worldwide Interoperability for Microwave Access (WI-MAX )
User
File Extension
Resumption
49. The problems solving state - the opposite of supervisor mode
User Mode (problem or program state)
Content Dependent Access Control
File Server
Residual Risk
50. Used to code/decode a digital data stream.
Residual Risk
Distributed Processing
Time Of Check/Time Of Use
Codec
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests