SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Natural or human-readable form of message
Plain Text
Machine Language (Machine Code)
Fraggle
Electronic Vaulting
2. Unauthorized wireless network access device.
Authentication
Rogue Access Points
Brouter
Electronic Vaulting
3. Memory management technique that allows two processes to run concurrently without interaction
Covert Channel
Protection
Surveillance
Twisted Pair
4. The collection and summation of risk data relating to a particular asset and controls for that asset
Operational Exercise
Risk Assessment
Alert/Alarm
Tapping
5. Interception of a communication session by an attacker.
Highly Confidential
Hijacking
Safeguard
Detective
6. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Worldwide Interoperability for Microwave Access (WI-MAX )
Bridge
3 Types of harm Addressed in computer crime laws
Record Level Deletion
7. The technical and risk assesment of a system within the context of the operating environment
Certification
Certificate Revocation List (CRL)
Data Leakage
Education
8. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Threats
Computer Forensics
Technical Access Controls
Embedded Systems
9. A record that must be preserved and available for retrieval if needed.
Quantitative
Domain
Vital Record
Marking
10. More than one CPU on a single board
Multi-Core
Detection
Polyalphabetic
Cache
11. Searching for wireless networks in a moving car.
Redundant Array Of Independent Drives (RAID)
War Driving
Repeaters
Common Law
12. Identification and notification of an unauthorized and/or undesired action
Gateway
Faraday Cage/ Shield
Detection
Accountability
13. A mathematical tool for verifying no unintentional changes have been made
Accreditation
Checksum
Degauss
Deletion
14. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Business Records
Overlapping Fragment Attack
Side Channel Attack
Keystroke Logging
15. Potentially compromising leakage of electrical or acoustical signals.
Custodian
Emanations
IP Fragmentation
Complete
16. Induces a crime - tricks a person - and is illegal
Entrapment
Alternate Data Streams (File System Forks)
IDS Intrusion Detection System
Keyed-Hashing For Message Authentication
17. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Hash Function
Hot Spares
File
Process Isolation
18. Written core statements that rarely change
Policy
Call Tree
Residual Risk
Incident Response
19. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Multi-Processing
Standalone Test
Data Custodian
Remote Access Trojan
20. Power surge
Running Key
Databases
Electrostatic Discharge
Mobile Site
21. Unsolicited advertising software
Privacy Laws
Redundant Array Of Independent Drives (RAID)
Adware
Spiral
22. Calculation encompassing threats - vulnerabilities and assets
Total Risk
Malformed Input
War Driving
False Negative
23. Prolonged loss of commercial power
Data Warehouse
Blackout
Slack Space
Inference
24. With enough computing power trying all possible combinations
Event
Change Control
Brute Force
TCSEC (Orange Book)
25. Binary decision by a system of permitting or denying access to the entire system
Secondary Storage
Containment
Business Interruption Insurance
Authentication
26. A backup of data located where staff can gain access readily and a localized disaster will not cause harm
Bridge
Near Site
Business Interruption
Alternate Data Streams (File System Forks)
27. Hiding the fact that communication has occurred
Activation
Steganography
Copyright
TEMPEST
28. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.
System Downtime
MOM
Digital Signature
Business Interruption Insurance
29. Creation distribution update and deletion
Key Management
Ring Protection
Symmetric
Conflict Of Interest
30. An unintended communication path
Certificate Revocation List (CRL)
Multi-Programming
Plain Text
Covert Channel
31. Small data files written to a user's hard drive by a web server.
Examples of technical security components
Criminal Law
Computer Forensics
Cookie
32. A distributed system's transaction control that requires updates to complete or rollback
Patch Management
Forensic Copy
2-Phase Commit
Database Replication
33. An encryption method that has a key as long as the message
Denial Of Service
False (False Positive)
Accountability
Running Key
34. High level design or model with a goal of consistency - integrity - and balance
Collisions
Architecture
Private Branch Exchange (PBX)
Trusted Computing Base
35. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Reciprocal Agreement
Hearsay
Remote Access Trojan
Guidelines
36. A backup type - for databases at a point in time
Shadowing (file shadowing)
Degauss
Hearsay Evidence
Malformed Input
37. A failure of an IDS to detect an actual attack
False Negative
Data Marts
Data Backup Strategies
Hacker
38. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. An event which stops business from continuing.
Detection
Digital Signature
Disaster
Governance
40. Joining two pieces of text
Binary
Quantitative
Concatenation
Radio Frequency Interference (RFI)
41. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Cross Training
Compression
Restoration
Data Integrity
42. Code making
One Time Pad
Database Replication
Masquerading
Cryptography
43. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due
Dictionary Attack
Elements of Negligence
Distributed Denial Of Service
Intrusion Detection Systems
44. A planned or unplanned interruption in system availability.
Fire Classes
Key Management
Physical Tampering
System Downtime
45. The partial or full duplication of data from a source database to one or more destination databases.
Database Replication
Full Test (Full Interruption)
Faraday Cage/ Shield
Data Marts
46. One of the key benefits of a network is the ability to share files stored on the server among several users.
Processes are Isolated By
Picking
Lattice
File Sharing
47. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)
Smurf
Non-Repudiation
Burn
Mobile Recovery
48. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.
ff Site
Instance
Residual Data
Mirroring
49. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Disk Mirroring
Simulation Test
Generator
Cross Certification
50. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Transfer
Workaround Procedures
State Machine Model
ISO/IEC 27001
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests