SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The managerial approval to operate a system based upon knowledge of risk to operate
State Machine Model
Accreditation
Key Space
Detective
2. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
User
ISO/IEC 27001
Operational Exercise
Gateway
3. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
Incident Response
Codec
IP Fragmentation
Primary Storage
4. A group or network of honeypots
Declaration
Orange Book C Classification
Honeynet
Cold Site
5. An unintended communication path
Covert Channel
Deleted File
Residual Risk
Fire Suppression
6. A state for operating system tasks only
Supervisor Mode (monitor - system - privileged)
Business Continuity Program
Compensating
Orange Book A Classification
7. Creation distribution update and deletion
Admissible
Key Management
Eavesdropping
Keyed-Hashing For Message Authentication
8. To start business continuity processes
User Mode (problem or program state)
Access Control Attacks
Activation
Object
9. System directed mediation of access with labels
Mandatory
Process Isolation
Central Processing Unit (CPU)
Blackout
10. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Security Clearance
TNI (Red Book)
Governance
Recovery Time Objectives
11. Responsibility for actions
Tracking
Liability
Mixed Law System
Multilevel Security System
12. Potential danger to information or systems
Faraday Cage/ Shield
Key Management
Threats
Infrastructure
13. Planning for the delegation of authority required when decisions must be made without the normal chain of command
Multi-Party Control
Electronic Vaulting
Civil Or Code Law
Executive Succession
14. To reduce sudden rises in current
Surge Suppressor
Injection
Cold Site
Physical Tampering
15. The chance that something negative will occur
Guidelines
Structured Walk-Through Test
Risk
Denial Of Service
16. Is secondhand and usually not admissible in court
Algorithm
Hearsay Evidence
Decipher
Supervisor Mode (monitor - system - privileged)
17. Recovery alternative - everything needed for the business function - except people and last backup
Hot Site
Hearsay Evidence
Vulnerability
Data Owner
18. The guardian of asset(s) - a maintenance activity
System Downtime
Public Key Infrastructure (PKI)
TCSEC (Orange Book)
Custodian
19. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
Running Key
Multi-Programming
Honeynet
20. A template for the designing the architecture
Security Blueprint
Fire Detection
Kerckhoff's Principle
Radio Frequency Interference (RFI)
21. Pertaining to law - lending it self to one side of an argument
MOM
Mission-Critical Application
Administrative Access Controls
Convincing
22. Moving letters around
Permutation /Transposition
Concatenation
Failure Modes and Effect Analysis (FEMA)
Forensic Copy
23. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Spam
UPS
Storage Area Network (SAN)
Virtual Memory
24. To jump to a conclusion
Sag/Dip
Asymmetric
Inference
Control
25. Interception of a communication session by an attacker.
Quantitative
Hijacking
Slack Space
File Sharing
26. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.
Tort
Repeaters
Memory Management
Data Backups
27. For PKI - decertify an entities certificate
Alternate Data Streams (File System Forks)
Activation
Lattice
Revocation
28. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Byte Level Deletion
Access Control
Picking
Orange Book A Classification
29. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Cryptology
Custodian
Generator
Chain of Custody
30. Event(s) that cause harm
Cryptovariable
Incident
Data Marts
Keyed-Hashing For Message Authentication
31. Recovery alternative - short-term - high cost movable processing location
Mobile Site
Malformed Input
Certification Authority
File
32. An administrative unit or a group of objects and subjects controlled by one reference monitor
Common Criteria
Security Domain
Permutation /Transposition
Acronym for American Standard Code for Information Interchange (ASCII)
33. With enough computing power trying all possible combinations
Data Custodian
Data Backup Strategies
Side Channel Attack
Brute Force
34. A set of laws that the organization agrees to be bound by
Standalone Test
Sequence Attacks
Administrative Law
Switches
35. An alert or alarm that is triggered when no actual attack has taken place
TNI (Red Book)
Crisis
False (False Positive)
Common Law
36. Dedicated fast memory located on the same board as the CPU
CPU Cache
Sequence Attacks
Concatenation
Inference
37. The first rating that requires security labels
Orange Book B1 Classification
Risk Assessment / Analysis
Crisis
Confidence Value
38. A device that sequentially switches multiple analog inputs to the output.
Proprietary
Multiplexers
Codec
ITSEC
39. Independent malware that requires user interaction to execute
Compression
Virus
Recovery Period
Interception
40. Forgery of the sender's email address in an email header.
Central Processing Unit (CPU)
Tapping
E-Mail Spoofing
Protection
41. A back up type - where the organization has excess capacity in another location.
Multi-Party Control
IP Fragmentation
Distributed Processing
Recovery
42. Process of statistically testing a data set for the likelihood of relevant information.
Instance
Business Continuity Planning (BCP)
Sampling
Physical Tampering
43. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Risk
Disaster
Administrative Access Controls
Plan Maintenance Procedures
44. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Total Risk
Hearsay
Tort
Embedded
45. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Common Criteria
Multi-Party Control
Privacy Laws
Key Escrow
46. Highest level of authority at EOC with knowledge of the business process and the resources available
Key Space
Fire Classes
Incident Manager
File Level Deletion
47. A backup type which creates a complete copy
Replication
Event
Mirrored Site
Cipher Text
48. Most granular organization of controls
Control Category
Workaround Procedures
Fraggle
Polymorphism
49. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Due Diligence
Surveillance
Initialization Vector
File Server
50. Evaluation of a system without prior knowledge by the tester
Mandatory
Double Blind Testing
Blind Testing
Kernel
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests