SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Firewalls - encryption - and access control lists
Object Oriented Programming (OOP)
Internal Use Only
Examples of technical security components
CobiT
2. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination
Crisis
Qualitative
Orange Book C Classification
Man-In-The-Middle Attack
3. The hard drive
Data Diddler
Gateway
Operational Test
Secondary Storage
4. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.
Slack Space
Ring Protection
Pointer
Mock Disaster
5. Granular decision by a system of permitting or denying access to a particular resource on the system
Hash Function
Mirrored Site
Architecture
Authorization
6. Total number of keys available that may be selected by the user of a cryptosystem
Running
Data Warehouse
Intrusion Detection Systems
Key Space
7. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Machine Language (Machine Code)
Recovery Strategy
Byte Level Deletion
Log
8. Maintenance procedures outline the process for the review and update of business continuity plans.
Data Dictionary
Plan Maintenance Procedures
Log
Object Reuse
9. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Object
Application Programming Interface
Honeynet
Emergency Procedures
10. Intellectual property management technique for identifying after distribution
Security Domain
Common Law
Watermarking
Key Space
11. Using many alphabets
Noise
Polyalphabetic
Data Owner
Alert
12. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Teardrop
Databases
3 Types of harm Addressed in computer crime laws
Decipher
13. Control category- to restore to a previous state by removing the adversary and or the results of their actions
Brute Force
Operating
Compiler
Corrective
14. Business and technical process of applying security software updates in a regulated periodic way
Patch Management
Mandatory
Exercise
Policy
15. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
Directive
Certificate Revocation List (CRL)
TNI (Red Book)
Replication
16. For PKI - to store another copy of a key
Redundant Servers
Key Escrow
Layering
Proxies
17. Subject based description of a system or a collection of resources
Capability Tables
Cold Site
Polyalphabetic
Sag/Dip
18. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing
Reciprocal Agreement
Digital Certificate
Record Level Deletion
Technical Access Controls
19. A technology that reduces the size of a file.
Inference
Fault
Compression
State Machine Model
20. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Checklist Test
Information Risk Management (IRM)
Non-Discretionary Access Control
Test Plan
21. System directed mediation of access with labels
Chain of Custody
Mandatory
Masquerading
Reciprocal Agreement
22. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Sag/Dip
Deterrent
Custodian
Tar Pits
23. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Compression
Basics Of Secure Design
Prevention
Procedure
24. An encryption method that has a key as long as the message
The ACID Test
Running Key
Pervasive Computing and Mobile Computing Devices
Conflict Of Interest
25. Independent malware that requires user interaction to execute
Mobile Site
Labeling
Virus
Digital Signature
26. A type of attack involving attempted insertion - deletion or altering of data.
Mixed Law System
Ring Protection
Modification
Data Warehouse
27. The study of cryptography and cryptanalysis
Mantrap (Double Door System)
Cryptology
Trapdoors (Backdoors) (Maintenance Hooks)
Operational Test
28. Inappropriate data
CPU Cache
Polymorphism
Malformed Input
Complete
29. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate
Firewalls
Administrative Law
Control
Public Key Infrastructure (PKI)
30. Potential danger to information or systems
Safeguard
Surge
Ring Protection
Threats
31. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.
Recovery Period
Electronic Vaulting
Deadlock
Business Impact Analysis
32. People who interact with assets
Security Clearance
Off-Site Storage
User
Work Factor
33. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Collisions
File Level Deletion
Failure Modes and Effect Analysis (FEMA)
CPU Cache
34. Part of a transaction control for a database which informs the database of the last recorded transaction
Checkpoint
Logic Bomb
Business Continuity Planning (BCP)
False Negative
35. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Critical Infrastructure
Bollard
Classification
Electromagnetic Interference (EMI)
36. Memory management technique which allows data to be moved from one memory address to another
Quantitative Risk Analysis
Relocation
Accreditation
Job Training
37. A physical enclosure for verifying identity before entry to a facility
Electrostatic Discharge
Mantrap (Double Door System)
Orange Book C Classification
Detective
38. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Data Backups
JPEG (Joint Photographic Experts Group)
Conflict Of Interest
Data Owner
39. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.
Degauss
Top Secret
Slack Space
Class
40. Property that data is represented in the same manner at all times
Consistency
Bumping
Mirrored Site
IP Address Spoofing
41. A documented battle plan for coordinating response to incidents.
Honeypot
Watermarking
Incident Handling
Data Custodian
42. Organized group of compromised computers
Maximum Tolerable Downtime (MTD)
Security Kernel
Botnet
Patch Management
43. Responsibility of a user for the actions taken by their account which requires unique identification
Enticement
Accountability
Fire Detection
Triage
44. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Domain
Mission-Critical Application
Inrush Current
Vital Record
45. Asymmetric encryption of a hash of message
Digital Signature
Replication
Archival Data
Tactical
46. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Mandatory
Open Mail Relay Servers
Certification Authority
Directive
47. A control after attack
Criminal Law
Countermeasure
Critical Records
Honeypot
48. False memory reference
Dangling Pointer
Critical Functions
Computer System Evidence
Cipher Text
49. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Switches
Proprietary
Transients
Phishing
50. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)
Uninterruptible Power Supply (UPS)
Declaration
Permutation /Transposition
Information Technology Security Evaluation Criteria - ITSEC
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests