SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An event which stops business from continuing.
Moore's Law
Site Policy Awareness
Copyright
Disaster
2. Unsolicited commercial email
Mirroring
Crisis
Spam
Checkpoint
3. For PKI - decertify an entities certificate
Revocation
Fault
Atomicity
Keyed-Hashing For Message Authentication
4. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Burn
Admissible
Mobile Site
Risk Assessment
5. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks
Brownout
Alarm Filtering
Cookie
Least Privilege
6. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements
Network Attached Storage (NAS)
Infrastructure
Copyright
ITSEC
7. Using small special tools all tumblers of the lock are aligned - opening the door
Sharing
Total Risk
Picking
Incident Handling
8. Code breaking - practice of defeating the protective properties of cryptography.
JPEG (Joint Photographic Experts Group)
Cryptanalysis
Access Control Lists
Running Key
9. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner
Degauss
Information Technology Security Evaluation Criteria - ITSEC
Disaster Recovery Teams (Business Recovery Teams)
Life Cycle of Evidence
10. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.
Boot (V.)
TEMPEST
Debriefing/Feedback
Legacy Data
11. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. To reduce sudden rises in current
Data Marts
Packet Filtering
Cryptovariable
Surge Suppressor
13. Location to perform the business function
Alternate Site
Memory Management
User Mode (problem or program state)
Remote Journaling
14. Statistical probabilities of a collision are more likely than one thinks
Forward Recovery
Overlapping Fragment Attack
Birthday Attack
Operational Impact Analysis
15. Low level - pertaining to planning
Business Interruption
Tactical
Enticement
Honeypot
16. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.
Botnet
Business Continuity Program
Internal Use Only
Rootkit
17. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals
Fire Classes
Cryptography
Hearsay Evidence
Fire Detection
18. Potentially retrievable data residue that remains following intended erasure of data.
Operational Impact Analysis
Remanence
Fraggle
Liability
19. Two different keys decrypt the same cipher text
Key Clustering
Critical Records
Business Recovery Timeline
Data Backups
20. Information about a particular data set
Keyed-Hashing For Message Authentication
Metadata
Rootkit
Application Programming Interface
21. Recovery alternative - complete duplication of services including personnel
False (False Positive)
Mirrored Site
Control
Switches
22. Autonomous malware that requires a flaw in a service
Checklist Test (desk check)
High-Risk Areas
Worm
Job Training
23. A unit of execution
Operational
Information Technology Security Evaluation Criteria - ITSEC
Threads
Cryptovariable
24. Moving letters around
Administrative Access Controls
Compression
Permutation /Transposition
Reference Monitor
25. Granular decision by a system of permitting or denying access to a particular resource on the system
Authorization
Satellite
Security Blueprint
Log
26. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.
Control Type
Key Clustering
Standalone Test
Business Recovery Team
27. Communicate to stakeholders
Debriefing/Feedback
Accurate
Emergency Procedures
Deterrent
28. A process state - to be executing a process on the CPU
Locard's Principle
Electronic Vaulting
Brouter
Running
29. Hardware or software that is part of a larger system
Man-In-The-Middle Attack
Near Site
Embedded
Recovery
30. To collect many small pieces of data
Picking
Interference (Noise)
Aggregation
Walk Though
31. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Salami
Interpreter
Detection
Classification Scheme
32. To start business continuity processes
Activation
Fire Suppression
Initialization Vector
TIFF (Tagged Image File Format)
33. Owner directed mediation of access
Database Shadowing
Qualitative
Fiber Optics
Discretionary
34. An individuals conduct that violates government laws developed to protect the public
CPU Cache
Criminal Law
Replication
Proprietary
35. Most granular organization of controls
Public Key Infrastructure (PKI)
Control Category
Data Marts
Orange Book D Classification
36. The property that data meet with a priority expectation of quality and that the data can be relied upon.
Business Continuity Program
Boot (V.)
Data Integrity
E-Mail Spoofing
37. Quantity of risk remaining after a control is applied
Redundant Servers
Residual Risk
Countermeasure
Cryptovariable
38. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.
Business Unit Recovery
Content Dependent Access Control
Primary Storage
Off-Site Storage
39. A type of attack involving attempted insertion - deletion or altering of data.
Revocation
Modification
Buffer Overflow
Bit
40. A database backup type which records at the transaction level
Investigation
Residual Risk
Remote Journaling
Sampling
41. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
File Shadowing
Incident Response Team
Symmetric
Multilevel Security System
42. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.
Rootkit
Restoration
Orange Book D Classification
Hot Site
43. A set of laws that the organization agrees to be bound by
Intrusion Prevention Systems
Framework
Administrative Law
On-Site
44. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur
Twisted Pair
Kerckhoff's Principle
Residual Risk
Failure Modes and Effect Analysis (FEMA)
45. A secure connection to another network.
Proxies
Gateway
Information Flow Model
Plan Maintenance Procedures
46. One entity with two competing allegiances
Data Owner
Cookie
Multilevel Security System
Conflict Of Interest
47. Subset of operating systems components dedicated to protection mechanisms
Electrostatic Discharge
Security Kernel
Critical Functions
Contingency Plan
48. Recording activities at the keyboard level
Proxies
Object Reuse
Keystroke Logging
E-Mail Spoofing
49. A mobilized resource purchased or contracted for the purpose of business recovery.
Denial Of Service
Restoration
Mobile Recovery
Key Management
50. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas
Compression
Incident Response Team
Sequence Attacks
Privacy Laws
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests