SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Use of specialized techniques for recovery - authentication - and analysis of electronic data
Computer Forensics
Due Diligence
Access Control Matrix
Encapsulation
2. To execute more than one instruction at an instant in time
Electromagnetic Interference (EMI)
Multi-Processing
Keystroke Logging
Structured Walk-Through Test
3. Mathematical function that determines the cryptographic operations
Algorithm
Emergency
Data Integrity
File Shadowing
4. To evaluate the current situation and make basic decisions as to what to do
Fire Prevention
Triage
Orange Book A Classification
Incident Manager
5. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.
Brute Force
Call Tree
Redundant Servers
Covert Channel
6. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Tort
Exercise
Technical Access Controls
Aggregation
7. A collection of data or information that has a name
Discretionary
MOM
File
Backup
8. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Pervasive Computing and Mobile Computing Devices
Critical Records
Cryptology
Multi-Tasking
9. Information about data or records
Metadata
Cryptology
Bollard
Warm Site
10. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Alert/Alarm
Metadata
Hot Spares
Detection
11. Information about a particular data set
Metadata
Record Level Deletion
Information Technology Security Evaluation Criteria - ITSEC
Recovery Point Objective (RPO)
12. Object based description of a single resource and the permission each subject
Access Control Lists
One Time Pad
Firewalls
Cold Site
13. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.
Emergency Procedures
Technical Access Controls
Mirroring
Conflict Of Interest
14. Vehicle or tool that exploits a weakness
Threats
TEMPEST
Database Replication
Mitigate
15. Potentially retrievable data residue that remains following intended erasure of data.
Certification Authority
Business Interruption
Remanence
Disaster Recovery Teams (Business Recovery Teams)
16. Independent malware that requires user interaction to execute
Virus
Quantitative
Data Custodian
Common Criteria
17. Potentially compromising leakage of electrical or acoustical signals.
Emanations
Complete
War Driving
Deadlock
18. A group or network of honeypots
Substitution
Modems
Mission-Critical Application
Honeynet
19. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?
Copyright
Desk Check Test
Intrusion Detection Systems
Picking
20. A description of a database
Digital Signature
Boot (V.)
Data Dictionary
Resumption
21. A documented battle plan for coordinating response to incidents.
Incident Handling
Failure Modes and Effect Analysis (FEMA)
Remote Journaling
Cryptovariable
22. Specific format of technical and physical controls that support the chosen framework and the architecture
Stopped
Disaster
Infrastructure
Logic Bomb
23. Inference about encrypted communications
Side Channel Attack
Mission-Critical Application
Microwave
Data Hiding
24. Pertaining to law - no omissions
Complete
Brute Force
EMI
Stopped
25. Momentary loss of power
Compression
Fault
Alternate Data Streams (File System Forks)
Crisis
26. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Interception
Race Condition
Waterfall
Degauss
27. The managerial approval to operate a system based upon knowledge of risk to operate
Framework
Accreditation
Memory Management
Cipher Text
28. OOP concept of an object at runtime
Accountability
5 Rules Of Evidence
Checksum
Instance
29. Most granular organization of controls
Watermarking
Running
Computer Forensics
Control Category
30. Data or interference that can trigger a false positive
Noise
Bumping
Business Interruption Insurance
Redundant Array Of Independent Drives (RAID)
31. Reduces causes of fire
Fire Prevention
Executive Succession
Data Backups
Initialization Vector
32. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Steganography
Alarm Filtering
Life Cycle of Evidence
Alert/Alarm
33. Control type- that is communication based - typically written or oral
Emergency Operations Center (EOC)
Administrative
Compression
Data Recovery
34. The level and label given to an individual for the purpose of compartmentalization
Security Clearance
Parallel Test
Virtual Memory
Labeling
35. Unchecked data which spills into another location in memory
Guidelines
Separation Of Duties
Buffer Overflow
Burn
36. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Multi-Processing
Interception
Orange Book D Classification
Preemptive
37. The one person responsible for data - its classification and control setting
Locard's Principle
Information Owner
Disaster Recovery Tape
Source Routing Exploitation
38. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Backup
Crisis
Fault
Honeypot
39. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities
Journaling
Change Control
Checklist Test
Data Marts
40. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components
Machine Language (Machine Code)
Reference Monitor
Message Digest
Masked/Interruptible
41. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Exposure
Orange Book D Classification
Basics Of Secure Design
Non-Repudiation
42. OOP concept of a taking attributes from the original or parent
Operational Impact Analysis
Inheritance
Civil Law
Chain Of Custody
43. Using small special tools all tumblers of the lock are aligned - opening the door
Message Digest
Incident
Picking
Tactical
44. Hitting a filed down key in a lock with a hammer to open without real key
Interpreter
Bumping
Criminal Law
Mandatory Vacations
45. A one way - directed graph which indicates confidentiality or integrity flow
Security Clearance
Hijacking
Lattice
Incident Handling
46. A back up type - where the organization has excess capacity in another location.
Distributed Processing
Firewall
Access Control Lists
Message Digest
47. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
Internal Use Only
3 Types of harm Addressed in computer crime laws
Tar Pits
Source Routing Exploitation
48. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Domain
Moore's Law
Central Processing Unit (CPU)
Uninterruptible Power Supply (UPS)
49. The collection and summation of risk data relating to a particular asset and controls for that asset
Inrush Current
Contingency Plan
Smurf
Risk Assessment
50. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Exposure
File Shadowing
Basics Of Secure Design
Common Law
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests