SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. System of law based upon precedence - with major divisions of criminal - tort - and administrative
Common Law
Remote Journaling
Civil Or Code Law
Access Control Attacks
2. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Data Owner
Framework
Emergency Procedures
ISO/IEC 27001
3. Object based description of a single resource and the permission each subject
Sniffing
Hearsay Evidence
Access Control Lists
Life Cycle of Evidence
4. A device that sequentially switches multiple analog inputs to the output.
MOM
Multiplexers
True Attack Stimulus
Symmetric
5. The managerial approval to operate a system based upon knowledge of risk to operate
Injection
Conflict Of Interest
Crisis
Accreditation
6. RADIUS - TACACS+ - Diameter
Computer Forensics
Bit
Data Owner
Centralized Access Control Technologies
7. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Preemptive
Desk Check Test
JPEG (Joint Photographic Experts Group)
Full Test (Full Interruption)
8. System directed mediation of access with labels
Exercise
Accountability
Marking
Mandatory
9. Key
Cryptovariable
Deleted File
Redundant Servers
JPEG (Joint Photographic Experts Group)
10. A program with an inappropriate second purpose
Orange Book A Classification
Bollard
Trojan Horse
Walk Though
11. Threats x Vulnerability x Asset Value = Total Risk
Total Risk
Security Domain
Notification
Business Impact Analysis
12. Reprogrammable basic startup instructions
Information Technology Security Evaluation Criteria - ITSEC
Firmware
Aggregation
Active Data
13. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective
Proprietary
Multi-Programming
Cross Training
Security Blueprint
14. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.
Source Routing Exploitation
Checksum
Contact List
Code
15. Total number of keys available that may be selected by the user of a cryptosystem
Polymorphism
Separation Of Duties
IDS Intrusion Detection System
Key Space
16. May be responsible for overall recovery of an organization or unit(s).
Certificate Revocation List (CRL)
Critical Functions
DR Or BC Coordinator
Satellite
17. A perpetrator leaves something behind or takes something with them at the scene of a crime
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. Lower frequency noise
Radio Frequency Interference (RFI)
Data Owner
Compensating
Packet Filtering
19. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
Standalone Test
Workaround Procedures
Standard
Accurate
20. Hitting a filed down key in a lock with a hammer to open without real key
Encipher
Bumping
Man-In-The-Middle Attack
Declaration
21. All of the protection mechanism in a computer system
Teardrop
Trusted Computing Base
UPS
Fault Tolerance
22. High frequency noise
Faraday Cage/ Shield
Education
Electromagnetic Interference (EMI)
Data Backup Strategies
23. Security policy - procedures - and compliance enforcement
Examples of non-technical security components
Concentrator
Crisis
Information Technology Security Evaluation Criteria - ITSEC
24. Real-time - automatic and transparent backup of data.
Intrusion Prevention Systems
Pervasive Computing and Mobile Computing Devices
Remote Journaling
Mobile Recovery
25. Owner directed mediation of access
Sag/Dip
Data Backups
IP Address Spoofing
Discretionary
26. Recording activities at the keyboard level
Risk Assessment / Analysis
Fault
Targeted Testing
Keystroke Logging
27. Reduction of voltage by the utility company for a prolonged period of time
Patch Management
Algorithm
Framework
Brownout
28. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
Code
Patch Management
Operational Exercise
System Downtime
29. Memory - RAM
Simulation
Analysis
Polyalphabetic
Primary Storage
30. Physical description on the exterior of an object that communicates the existence of a label
Safeguard
Marking
Payload
Multi-Programming
31. Guidelines within an organization that control the rules and configurations of an IDS
Chain Of Custody
Work Factor
Conflict Of Interest
Site Policy
32. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Watermarking
Test Plan
Administrative
Electronic Vaulting
33. A software design technique for abstraction of a process
Data Hiding
ff Site
Asymmetric
Shift Cipher (Caesar)
34. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Call Tree
JPEG (Joint Photographic Experts Group)
2-Phase Commit
Reference Monitor
35. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.
War Dialing
Covert Channel
Brouter
Hot Site
36. Sphere of influence
Residual Risk
Multi-Party Control
Domain
Mirroring
37. A type of attack involving attempted insertion - deletion or altering of data.
Mitigate
Incident Response
Modification
TEMPEST
38. Encryption system using shared key/private key/single key/secret key
Database Shadowing
Symmetric
Business Recovery Team
Notification
39. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Data Marts
Overlapping Fragment Attack
Top Secret
Remanence
40. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.
Bridge
Classification Scheme
Structured Walkthrough
Monitor
41. OOP concept of a class's details to be hidden from object
Multi-Processor
False Attack Stimulus
IP Address Spoofing
Encapsulation
42. Vehicle stopping object
State Machine Model
Bollard
Orange Book B1 Classification
Metadata
43. Control type- that is communication based - typically written or oral
Dictionary Attack
Administrative
Administrative Laws
Compensating
44. People protect their domain
Territoriality
Tapping
Job Rotation
Information Technology Security Evaluation Criteria - ITSEC
45. To jump to a conclusion
Inference
Off-Site Storage
Non-Discretionary Access Control
Electrostatic Discharge
46. Weakness or flaw in an asset
Layering
Vulnerability
Operational Exercise
Patch Panels
47. Process of statistically testing a data set for the likelihood of relevant information.
Civil Or Code Law
Mobile Site
Sampling
Inheritance
48. Written step-by-step actions
Simulation Test
Procedure
Access Control
Accurate
49. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Binary
Strong Authentication
Multi-Programming
Data Dictionary
50. Power surge
Electrostatic Discharge
SQL Injection
Attacker (Black hat - Hacker)
File Extension
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests