SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unused storage capacity
IP Fragmentation
False (False Positive)
Slack Space
Legacy Data
2. System mediation of access with the focus on the context of the request
Content Dependent Access Control
Alert
Phishing
Key Management
3. Weakness or flaw in an asset
Detection
Emergency
Prevention
Vulnerability
4. A form of data hiding which protects running threads of execution from using each other's memory
Modification
Process Isolation
Key Clustering
Compensating
5. Converts source code to an executable
Authorization
Disk Mirroring
Inrush Current
Compiler
6. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.
Orange Book B2 Classification
Multiplexers
BCP Testing Drills and Exercises
Injection
7. To evaluate the current situation and make basic decisions as to what to do
Territoriality
Triage
Botnet
Sampling
8. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.
Off-Site Storage
Orange Book C Classification
Satellite
Mantrap (Double Door System)
9. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.
Simulation Test
Identification
Critical Functions
Multi-Processing
10. Record of system activity - which provides for monitoring and detection.
Log
Business Recovery Team
Confidence Value
Atomicity
11. Pertaining to law - high degree of veracity
Accurate
Machine Language (Machine Code)
Lattice
Simulation Test
12. Unauthorized access of network devices.
Physical Tampering
War Dialing
Man-In-The-Middle Attack
Mobile Site
13. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements
Convincing
Common Criteria
User
Microwave
14. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Total Risk
Crisis
Coaxial Cable
Quantitative Risk Analysis
15. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Targeted Testing
Administrative Laws
Administrative Access Controls
Alarm Filtering
16. To move from location to location - keeping the same function
Switches
Access Control
Job Rotation
Fire Detection
17. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions
ff Site
DR Or BC Coordinator
Operational Exercise
Sampling
18. A layer 2 device that used to connect two network segments and regulate traffic.
True Attack Stimulus
Alarm Filtering
Bridge
Forensic Copy
19. Sphere of influence
Framework
Strong Authentication
Simulation
Domain
20. A unit of execution
Noise
Threads
Event
Bridge
21. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).
Degauss
Alert
Emanations
Salami
22. An attack that breaks up malicious code into fragments - in an attempt to elude detection.
MOM
Forensic Copy
UPS
IP Fragmentation
23. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.
Switches
Evidence
Twisted Pair
Stopped
24. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Threats
Running Key
Coaxial Cable
Information Risk Management (IRM)
25. A software design technique for abstraction of a process
True Attack Stimulus
Data Hiding
Security Clearance
Contingency Plan
26. Malware that subverts the detective controls of an operating system
Inheritance
File Sharing
Certification Authority
Rootkit
27. A choice in risk management - to implement a control that limits or lessens negative effects
Mitigate
Highly Confidential
2-Phase Commit
Security Kernel
28. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN
Strong Authentication
Identification
False Attack Stimulus
Orange Book B2 Classification
29. Another subject cannot see an ongoing or pending update until it is complete
Isolation
Cryptovariable
Threats
Residual Risk
30. Mitigate damage by isolating compromised systems from the network.
Alternate Data Streams (File System Forks)
Containment
Data Diddler
Threads
31. A structured group of teams ready to take control of the recovery operations if a disaster should occur.
MOM
Governance
Disaster Recovery Teams (Business Recovery Teams)
Mixed Law System
32. One of the key benefits of a network is the ability to share files stored on the server among several users.
File Sharing
Executive Succession
MOM
Slack Space
33. A state for operating system tasks only
Supervisor Mode (monitor - system - privileged)
Critical Functions
Data Backups
Computer Forensics
34. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.
Contingency Plan
Reference Monitor
Keystroke Logging
Residual Risk
35. Data or interference that can trigger a false positive
Business Interruption Insurance
Orange Book B2 Classification
Alarm Filtering
Noise
36. Joining two pieces of text
Distributed Processing
Concatenation
Sequence Attacks
Sampling
37. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.
Recovery Period
Exercise
Deleted File
Walk Though
38. Return to a normal state
Total Risk
Recovery
Failure Modes and Effect Analysis (FEMA)
Strategic
39. Reduction of voltage by the utility company for a prolonged period of time
Mirroring
Brownout
Key Management
5 Rules Of Evidence
40. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Phishing
Activation
Double Blind Testing
File Shadowing
41. An availability attack - to consume resources to the point of exhaustion from multiple vectors
Emergency Operations Center (EOC)
File
Packet Filtering
Distributed Denial Of Service
42. A disturbance that degrades performance of electronic devices and electronic communications.
Radio Frequency Interference (RFI)
Orange Book C Classification
Primary Storage
Bridge
43. Interception of a communication session by an attacker.
Governance
Emergency
Contingency Plan
Hijacking
44. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.
File Extension
Conflict Of Interest
Classification
Attacker (Black hat - Hacker)
45. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements
Job Rotation
TCSEC (Orange Book)
Corrective
Orange Book D Classification
46. Control category - more than one control on a single asset
Byte
Compensating
Mirroring
Control
47. Business and technical process of applying security software updates in a regulated periodic way
Electronic Vaulting
Patch Management
Routers
Birthday Attack
48. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.
Hard Disk
Chain Of Custody
IP Fragmentation
Business Records
49. The event signaling an IDS to produce an alarm when no attack has taken place
Ethics
File
Conflict Of Interest
False Attack Stimulus
50. Memory management technique which allows subjects to use the same resource
Sharing
Multilevel Security System
Compensating
Inheritance
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests