SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To move from location to location - keeping the same function
Job Rotation
Microwave
Threat Agent
Triage
2. A software design technique for abstraction of a process
Multi-Tasking
Exercise
Mock Disaster
Data Hiding
3. To reduce sudden rises in current
Physical Tampering
Orange Book A Classification
Smurf
Surge Suppressor
4. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.
Checksum
Concatenation
Reciprocal Agreement
Warm Site
5. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.
Territoriality
Analysis
Triage
Wireless Fidelity (Wi-Fi )
6. Written step-by-step actions
Authentic
Security Clearance
Procedure
Discretionary
7. A group or network of honeypots
Evidence
Honeynet
Accountability
Classification Scheme
8. Record of system activity - which provides for monitoring and detection.
Burn
Identification
Log
Due Care
9. A type of multitasking that allows for more even distribution of computing time among competing request
Recovery Point Objective (RPO)
Preemptive
Capability Tables
Data Backup Strategies
10. Real-time data backup ( Data Mirroring)
Object Reuse
Common Criteria
Keyed-Hashing For Message Authentication
Database Shadowing
11. Mediation of covert channels must be addressed
Information Flow Model
Strong Authentication
Plaintext
Deletion
12. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.
Resumption
Disaster Recovery Plan
Investigation
Business Impact Analysis
13. Mediation of subject and object interactions
Information Owner
Incident Handling
Access Control Lists
Access Control
14. A legal enforceable agreement between: two people - two organizations - a person and an organization.
Codec
Tort
Countermeasure
Business Unit Recovery
15. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.
Entrapment
Residual Risk
Recovery Strategy
Boot (V.)
16. Scrambled form of the message or data
Call Tree
Residual Risk
Cipher Text
Metadata
17. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Orange Book B2 Classification
Radio Frequency Interference (RFI)
Data Marts
Capability Tables
18. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.
Business Continuity Steering Committee
Side Channel Attack
Infrastructure
Parallel Test
19. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Administrative Access Controls
Gateway
Site Policy
Fault Tolerance
20. Recording activities at the keyboard level
Keystroke Logging
Vulnerability
Recovery Strategy
Contingency Plan
21. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.
Alternate Data Streams (File System Forks)
Hijacking
Exercise
Uninterruptible Power Supply (UPS)
22. Malware that subverts the detective controls of an operating system
Policy
Rootkit
Framework
Multilevel Security System
23. Recovery alternative - complete duplication of services including personnel
Denial Of Service
Data Dictionary
Mirrored Site
Checklist Test (desk check)
24. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.
Crisis
Investigation
File Server
Distributed Processing
25. The guardian of asset(s) - a maintenance activity
Incident Manager
Alert
Prevention
Custodian
26. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. Trading one for another
Running
IP Address Spoofing
Database Shadowing
Substitution
28. Periodic - automatic and transparent backup of data in bulk.
Initialization Vector
Electronic Vaulting
Business Recovery Team
Time Of Check/Time Of Use
29. A design methodology which executes in a linear one way fashion
Race Condition
Waterfall
Data Custodian
Twisted Pair
30. A signal suggesting a system has been or is being attacked.
Alert/Alarm
Compression
Disaster Recovery Teams (Business Recovery Teams)
Revocation
31. A distributed system's transaction control that requires updates to complete or rollback
Keystroke Logging
2-Phase Commit
Interpreter
Cross Certification
32. Uncheck data input which results in redirection
Hijacking
Business Unit Recovery
HTTP Response Splitting
Cryptology
33. Organization way of classifying data by factors such as criticality - sensitivity and ownership.
Orange Book B1 Classification
Walk Though
Classification Scheme
File Shadowing
34. Hardware or software that is part of a larger system
Embedded
Birthday Attack
Wait
Interpreter
35. Record history of incident
Enticement
Tracking
Civil Law
Analysis
36. False memory reference
Dangling Pointer
Examples of non-technical security components
Fire Detection
Shadowing (file shadowing)
37. A layer 3 device that used to connect two or more network segments and regulate traffic.
Routers
Change Control
False Negative
Mandatory Access Control (MAC)
38. Provides a physical cross connect point for devices.
Buffer Overflow
Patch Panels
Alarm Filtering
Compiler
39. A layer 2 device that used to connect two or more network segments and regulate traffic.
Incident
Switches
Byte Level Deletion
Analysis
40. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Pervasive Computing and Mobile Computing Devices
Standalone Test
Supervisor Mode (monitor - system - privileged)
Satellite
41. Encryption system using shared key/private key/single key/secret key
Byte
Symmetric
Pointer
System Downtime
42. To load the first piece of software that starts a computer.
Detective
Fiber Optics
Boot (V.)
Isolation
43. An alert or alarm that is triggered when no actual attack has taken place
False (False Positive)
State Machine Model
Mitigate
Business Impact Assessment (BIA)
44. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.
Failure Modes and Effect Analysis (FEMA)
Intrusion Prevention Systems
Technical Access Controls
Governance
45. The event signaling an IDS to produce an alarm when no attack has taken place
Detection
Forward Recovery
False Attack Stimulus
Surge
46. Long term knowledge building
Contingency Plan
Digital Signature
Education
Polyalphabetic
47. Quantity of risk remaining after a control is applied
Residual Risk
Log
Brownout
Encipher
48. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
EMI
Risk Mitigation
Double Blind Testing
Burn
49. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.
Polyalphabetic
Damage Assessment
Change Control
Education
50. To jump to a conclusion
Inference
Control Category
JPEG (Joint Photographic Experts Group)
Asymmetric
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests