SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OOP concept of a taking attributes from the original or parent
Inheritance
Application Programming Interface
Failure Modes and Effect Analysis (FEMA)
Isolation
2. High frequency noise
Electromagnetic Interference (EMI)
Interference (Noise)
Complete
Emergency Procedures
3. Subject based description of a system or a collection of resources
Hearsay
Capability Tables
Bridge
Rogue Access Points
4. Intellectual property protection for an confidential and critical process
Surveillance
Trade Secret
Integrated Test
Computer System Evidence
5. A process state - to be executing a process on the CPU
Running
Elements of Negligence
High-Risk Areas
Service Bureau
6. A process state - to be either be unable to run waiting for an external event or terminated
Stopped
Tactical
Application Programming Interface
Threats
7. Security policy - procedures - and compliance enforcement
Firmware
Binary
Examples of non-technical security components
Picking
8. OOP concept of a class's details to be hidden from object
Degauss
Operational Test
Encapsulation
Incident Manager
9. Program instructions based upon the CPU's specific architecture
Machine Language (Machine Code)
Alert
Denial Of Service
Covert Channel
10. Unsolicited advertising software
Residual Data
Security Blueprint
Orange Book A Classification
Adware
11. A race condition where the security changes during the object's access
Time Of Check/Time Of Use
Database Shadowing
Least Privilege
Resumption
12. The core logic engine of an operating system which almost never changes
Revocation
Voice Over IP (VOIP)
Sequence Attacks
Kernel
13. Independent malware that requires user interaction to execute
Business Impact Analysis
Emergency
Rootkit
Virus
14. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Data Integrity
Teardrop
DR Or BC Coordinator
Degauss
15. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware
Call Tree
Disk Mirroring
Cross-Site Scripting
Deterrent
16. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.
Shielding
Emergency Operations Center (EOC)
Parallel Test
Alternate Site
17. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Distributed Denial Of Service
Detective
Ring Protection
Time Of Check/Time Of Use
18. To smooth out reductions or increases in power
UPS
Alternate Site
Layering
SYN Flooding
19. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Accreditation
Electronic Vaulting
Symmetric
Privacy Laws
20. Potentially compromising leakage of electrical or acoustical signals.
Identification
Emanations
Privacy Laws
Interpreter
21. False memory reference
Proprietary
Complete
Cross-Site Scripting
Dangling Pointer
22. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Data Owner
Virtual Memory
Tar Pits
Accurate
23. A form of data hiding which protects running threads of execution from using each other's memory
Process Isolation
State Machine Model
Application Programming Interface
Detective
24. A program that waits for a condition or time to occur that executes an inappropriate activity
Locard's Principle
Logic Bomb
Firmware
Evidence
25. Searching for wireless networks in a moving car.
Contact List
War Driving
5 Rules Of Evidence
Job Training
26. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Internal Use Only
Legacy Data
Overlapping Fragment Attack
CPU Cache
27. A design methodology which executes in a linear one way fashion
Watermarking
Waterfall
Discretionary Access Control (DAC)
Criminal Law
28. Power surge
Electrostatic Discharge
Criminal Law
Threat Agent
Detective
29. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Atomicity
Hot Spares
ISO/IEC 27002
Top Secret
30. Summary of a communication for the purpose of integrity
Race Condition
Notification
Message Digest
User Mode (problem or program state)
31. To move from location to location - keeping the same function
Copyright
Job Rotation
Elements of Negligence
Site Policy
32. A database that contains the name - type - range of values - source and authorization for access for each data element
Admissible
Data Dictionary
Policy
Criminal Law
33. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.
Risk
File Server
Operational Test
Critical Records
34. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept
Contingency Plan
Total Risk
Repeaters
Ring Protection
35. A trusted issuer of digital certificates
Threads
Mantrap (Double Door System)
Certification Authority
Atomicity
36. A collection of data or information that has a name
File
Business Unit Recovery
Alert
Custodian
37. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions
Orange Book D Classification
Database Replication
Control Type
Disaster Recovery Teams (Business Recovery Teams)
38. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.
DR Or BC Coordinator
Legacy Data
Deterrent
Incident Response
39. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Tar Pits
War Driving
Life Cycle of Evidence
Satellite
40. Something that happened
Atomicity
Event
Locard's Principle
Cookie
41. Forgery of the sender's email address in an email header.
E-Mail Spoofing
Digital Signature
Control Type
Examples of non-technical security components
42. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Log
Failure Modes and Effect Analysis (FEMA)
Firewalls
Workaround Procedures
43. Intellectual property protection for marketing efforts
Trademark
Data Leakage
Message Digest
Multi-Tasking
44. Of a system without prior knowledge by the tester or the tested
Forensic Copy
TEMPEST
Control
Double Blind Testing
45. Trading one for another
Substitution
Fire Classes
Backup
Containment
46. The partial or full duplication of data from a source database to one or more destination databases.
Database Replication
Sequence Attacks
Basics Of Secure Design
Private Branch Exchange (PBX)
47. Information about data or records
Liability
Privacy Laws
Certification
Metadata
48. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated
Business Continuity Steering Committee
Restoration
Job Training
Initialization Vector
49. A record that must be preserved and available for retrieval if needed.
CobiT
Time Of Check/Time Of Use
Storage Area Network (SAN)
Vital Record
50. A backup type which creates a complete copy
Modems
Operating
Liability
Replication
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests