SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Initial surge of current
Inrush Current
Mandatory Access Control (MAC)
Standalone Test
Steganography
2. Recovery alternative - short-term - high cost movable processing location
Degauss
Alternate Data Streams (File System Forks)
Mobile Site
Packet Filtering
3. Provides a physical cross connect point for devices.
Patch Panels
Honeynet
Packet Filtering
Slack Space
4. Less granular organization of controls -
Control Type
Trojan Horse
Metadata
Access Control Attacks
5. Written suggestions that direct choice to a few alternatives
Guidelines
Examples of technical security components
Machine Language (Machine Code)
Information Technology Security Evaluation Criteria - ITSEC
6. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.
Business Recovery Team
Test Plan
Denial Of Service
Incident Handling
7. Long term knowledge building
Warm Site
Processes are Isolated By
Satellite
Education
8. Low level - pertaining to planning
Walk Though
Tactical
Directive
Business Continuity Steering Committee
9. Program instructions based upon the CPU's specific architecture
Hearsay Evidence
Business Continuity Planning (BCP)
Authorization
Machine Language (Machine Code)
10. Encryption system using a pair of mathematically related unequal keys
Asymmetric
Key Clustering
Blackout
Recovery Point Objective (RPO)
11. Employment education done once per position or at significant change of function
Job Training
Packet Filtering
Business Recovery Team
DR Or BC Coordinator
12. Eavesdropping on network communications by a third party.
Virtual Memory
Sniffing
Rogue Access Points
User Mode (problem or program state)
13. The event signaling an IDS to produce an alarm when no attack has taken place
Conflict Of Interest
Residual Risk
False Attack Stimulus
Quantitative
14. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials
Security Blueprint
Operational Impact Analysis
Embedded Systems
Administrative Laws
15. Hiding the fact that communication has occurred
Steganography
Deadlock
Cryptology
Detection
16. Two different keys decrypt the same cipher text
Admissible
Key Clustering
Incident
Preemptive
17. For PKI - to store another copy of a key
Key Escrow
System Life Cycle
Residual Risk
Substitution
18. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.
Embedded Systems
ISO/IEC 27001
Authorization
Multi-Processing
19. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance
Record Level Deletion
Redundant Array Of Independent Drives (RAID)
BCP Testing Drills and Exercises
Sampling
20. A subnetwork with storage devices servicing all servers on the attached network.
Storage Area Network (SAN)
Wireless Fidelity (Wi-Fi )
Collisions
Criminal Law
21. Recovery alternative - complete duplication of services including personnel
Plan Maintenance Procedures
Analysis
Mirrored Site
War Driving
22. A electronic attestation of identity by a certificate authority
Vital Record
Permutation /Transposition
Digital Certificate
Centralized Access Control Technologies
23. To know more than one job
ISO/IEC 27001
Criminal Law
Cross Training
Voice Over IP (VOIP)
24. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Running
Log
2-Phase Commit
Strong Authentication
25. Two certificate authorities that trust each other
Prevention
Rootkit
Cross Certification
User
26. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code
3 Types of harm Addressed in computer crime laws
Threats
Test Plan
False Negative
27. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.
Service Bureau
High-Risk Areas
Cryptovariable
CPU Cache
28. To set the clearance of a subject or the classification of an object
Labeling
User Mode (problem or program state)
Strong Authentication
Security Clearance
29. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Electronic Vaulting
True Attack Stimulus
Redundant Servers
Smurf
30. An availability attack - to consume resources to the point of exhaustion
Masked/Interruptible
Denial Of Service
Critical Functions
Polyalphabetic
31. An unintended communication path
Directive
Threat Agent
Life Cycle of Evidence
Covert Channel
32. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm
Microwave
Checklist Test
Mandatory Access Control (MAC)
Cryptovariable
33. Creation distribution update and deletion
Intrusion Prevention Systems
Brownout
Storage Area Network (SAN)
Key Management
34. Lower frequency noise
Radio Frequency Interference (RFI)
Restoration
Database Replication
Security Domain
35. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.
Tar Pits
Ethics
Information Technology Security Evaluation Criteria - ITSEC
Identification
36. Renders the record inaccessible to the database management system
Record Level Deletion
Replication
Alarm Filtering
Atomicity
37. Deals with discretionary protection
Preemptive
Orange Book C Classification
Replication
Secondary Storage
38. Final purpose or result
Payload
Orange Book C2 Classification
Double Blind Testing
Cookie
39. A design methodology which executes in a linear one way fashion
Work Factor
Firewalls
Waterfall
Virus
40. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Object Oriented Programming (OOP)
Business Impact Analysis
Repeaters
Memory Management
41. The core of a computer that calculates
Encryption
Admissible
Switches
Central Processing Unit (CPU)
42. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Brouter
Journaling
Disaster Recovery Plan
Data Leakage
43. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements
Incident Response
Orange Book B1 Classification
Picking
TNI (Red Book)
44. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).
Wireless Fidelity (Wi-Fi )
Hub
Restoration
Inference
45. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."
Administrative Access Controls
Business Records
Machine Language (Machine Code)
Disaster Recovery Tape
46. Process of statistically testing a data set for the likelihood of relevant information.
Log
Digital Certificate
Notification
Sampling
47. Potentially compromising leakage of electrical or acoustical signals.
Log
Emanations
Pointer
Contingency Plan
48. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Simulation
Class
Threads
Mandatory Access Control (MAC)
49. Weakness or flaw in an asset
Database Shadowing
Vulnerability
Repeaters
Administrative
50. Information that - if made public or even shared around the organization - could seriously impede the organization's operations
Fragmented Data
Highly Confidential
Shift Cipher (Caesar)
Teardrop
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests