SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A layer 3 device that used to connect two or more network segments and regulate traffic.
Atomicity
Brute Force
Digital Signature
Routers
2. Highest level of authority at EOC with knowledge of the business process and the resources available
Central Processing Unit (CPU)
Noise
Deleted File
Incident Manager
3. Renders the file inaccessible to the operating system - available to reuse for data storage.
Bridge
Atomicity
File Level Deletion
Privacy Laws
4. Control type- that is communication based - typically written or oral
Administrative
Mandatory Vacations
Watermarking
Burn
5. A choice in risk management - to convince another to assume risk - typically by payment
On-Site
Transfer
Conflict Of Interest
Encapsulation
6. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources
True Attack Stimulus
Workaround Procedures
Chain of Custody
2-Phase Commit
7. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)
Reference Monitor
Alternate Data Streams (File System Forks)
Attacker (Black hat - Hacker)
Interception
8. Property that data is represented in the same manner at all times
Consistency
Lattice
Routers
Interception
9. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data
Multiplexers
Fault
Distributed Processing
Byte Level Deletion
10. Most granular organization of controls
Walk Though
Permutation /Transposition
Control Category
Record Level Deletion
11. The event signaling an IDS to produce an alarm when no attack has taken place
ISO/IEC 27001
False Attack Stimulus
Kerckhoff's Principle
Incident
12. High level - pertaining to planning
Protection
Strategic
War Driving
Orange Book A Classification
13. Real-time data backup ( Data Mirroring)
Process Isolation
Standalone Test
Database Shadowing
Object
14. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.
Business Interruption Insurance
Exercise
Data Warehouse
Mission-Critical Application
15. Part of a transaction control for a database which informs the database of the last recorded transaction
Deletion
Encapsulation
Checkpoint
Security Clearance
16. An availability attack - to consume resources to the point of exhaustion
Non-Interference
Durability
Denial Of Service
Detective
17. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity
Tort
Site Policy Awareness
Fraggle
Residual Data
18. The technical and risk assesment of a system within the context of the operating environment
Confidence Value
Application Programming Interface
Certification
Buffer Overflow
19. Business and technical process of applying security software updates in a regulated periodic way
Trade Secret
EMI
Site Policy
Patch Management
20. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Control Category
Data Marts
Tapping
ITSEC
21. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Keyed-Hashing For Message Authentication
Administrative Access Controls
True Attack Stimulus
Checklist Test
22. A programming design concept which abstracts one set of functions from another in a serialized fashion
Business Impact Analysis
Memory Management
Procedure
Layering
23. A passive network attack involving monitoring of traffic.
Eavesdropping
Transfer
Multi-Core
Method
24. The guardian of asset(s) - a maintenance activity
Algorithm
Custodian
Education
Risk
25. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Failure Modes and Effect Analysis (FEMA)
Key Clustering
Denial Of Service
Backup
26. A technology that reduces the size of a file.
Alert/Alarm
Compression
Business Recovery Team
Uninterruptible Power Supply (UPS)
27. Autonomous malware that requires a flaw in a service
Certification
Security Kernel
Recovery Strategy
Worm
28. Impossibility of denying authenticity and identity
Non-Repudiation
Initialization Vector
Hard Disk
State Machine Model
29. Potentially compromising leakage of electrical or acoustical signals.
Surge
Recovery Point Objective (RPO)
Compression
Emanations
30. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court
Distributed Denial Of Service
Business Interruption Insurance
SQL Injection
Chain of Custody
31. Recognition of an individual's assertion of identity.
Dangling Pointer
Worldwide Interoperability for Microwave Access (WI-MAX )
Identification
Due Care
32. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.
Forward Recovery
Substitution
Exercise
Tort
33. Deals with discretionary protection
Running
Governance
Bollard
Orange Book C Classification
34. A signal suggesting a system has been or is being attacked.
Alert/Alarm
Admissible
Non-Discretionary Access Control
False Attack Stimulus
35. Potential danger to information or systems
Radio Frequency Interference (RFI)
Hearsay Evidence
Threats
Ring Protection
36. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Primary Storage
Declaration
Exposure
Key Space
37. An individuals conduct that violates government laws developed to protect the public
Safeguard
Criminal Law
Damage Assessment
Discretionary
38. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?
Multi-Processor
Territoriality
Triage
Checklist Test (desk check)
39. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Corrective
Burn
Radio Frequency Interference (RFI)
Coaxial Cable
40. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Information Owner
Information Flow Model
Business Continuity Program
Byte
41. Hitting a filed down key in a lock with a hammer to open without real key
Bumping
Firewall
Data Integrity
Governance
42. A computer designed for the purpose of studying adversaries
Patch Panels
Honeypot
File Shadowing
Isolation
43. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.
Exposure
Civil Or Code Law
Key Space
Residual Data
44. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive
Kerckhoff's Principle
Wait
Virtual Memory
Botnet
45. Return to a normal state
Running
Recovery
Directive
Bollard
46. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Orange Book B1 Classification
Life Cycle of Evidence
Embedded
Backup
47. A risk assessment method - intrinsic value
Sag/Dip
Qualitative
False Attack Stimulus
Intrusion Prevention Systems
48. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities
Risk Mitigation
DR Or BC Coordinator
BCP Testing Drills and Exercises
Analysis
49. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Data Hiding
War Dialing
Quantitative Risk Analysis
Control Category
50. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Convincing
Operational Impact Analysis
Disaster
Hot Spares
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests