SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hiding the fact that communication has occurred
State Machine Model
Fire Prevention
Steganography
Redundant Servers
2. A mail server that improperly allows inbound SMTP connections for domains it does not serve.
Criminal Law
Time Of Check/Time Of Use
Standard
Open Mail Relay Servers
3. A system that enforces an access control policy between two networks.
Detective
Firewalls
Risk Assessment / Analysis
Work Factor
4. Natural or human-readable form of message
Architecture
Degauss
Plain Text
Mobile Site
5. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.
Boot (V.)
Fire Detection
Acronym for American Standard Code for Information Interchange (ASCII)
Deleted File
6. A software design technique for abstraction of a process
Data Hiding
Access Point
Detective
Risk Mitigation
7. Program that inappropriately collects private data or activity
Spyware
Job Training
Certification
Monitor
8. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.
Vital Record
Prevention
Near Site
Data Owner
9. Real-time data backup ( Data Mirroring)
ITSEC
Off-Site Storage
Bollard
Database Shadowing
10. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.
Tort
Slack Space
Disk Mirroring
Brownout
11. Trading one for another
Stopped
Substitution
Admissible
Operational Exercise
12. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists
Business Records
Authentic
Shadowing (file shadowing)
Brute Force
13. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Masquerading
Wireless Fidelity (Wi-Fi )
Basics Of Secure Design
War Dialing
14. OOP concept of a distinct copy of the class
Business Records
Common Criteria
Object
Directive
15. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Evidence
Exposure
Smurf
Firmware
16. Record of system activity - which provides for monitoring and detection.
Shadowing (file shadowing)
Key Escrow
Log
Processes are Isolated By
17. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Wait
Mission-Critical Application
Deletion
Transients
18. To break a business process into separate functions and assign to different people
Fire Classes
Security Clearance
Separation Of Duties
Proxies
19. Control type- that is communication based - typically written or oral
Cipher Text
Administrative
Digital Signature
Hearsay
20. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.
Time Of Check/Time Of Use
Malformed Input
Worldwide Interoperability for Microwave Access (WI-MAX )
Exercise
21. Potential danger to information or systems
Identification
Lattice
Attacker (Black hat - Hacker)
Threats
22. Communication of a security incident to stakeholders and data owners.
Declaration
Strategic
Legacy Data
Notification
23. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.
Simulation Test
Architecture
Safeguard
The ACID Test
24. Natural occurrence in circuits that are in close proximity
Alert
Interference (Noise)
Patch Panels
Decipher
25. A Trojan horse with the express underlying purpose of controlling host from a distance
EMI
Remote Access Trojan
Structured Walkthrough
Redundant Array Of Independent Drives (RAID)
26. Hitting a filed down key in a lock with a hammer to open without real key
Transfer
Residual Data
Bumping
Analysis
27. A BCP testing type - a test that answers the question: Can the organization replicate the business process?
Computer Forensics
Disaster Recovery Plan
E-Mail Spoofing
Simulation
28. The core of a computer that calculates
Cryptography
Strong Authentication
Authentic
Central Processing Unit (CPU)
29. The core logic engine of an operating system which almost never changes
Kernel
Job Rotation
Hash Function
Access Control Attacks
30. Pertaining to law - accepted by a court
Admissible
Secondary Storage
ff Site
Trade Secret
31. Controls for logging and alerting
Intrusion Detection Systems
Critical Records
Buffer Overflow
Hacker
32. Transaction controls for a database - a return to a previous state
TEMPEST
Repeaters
Rollback
Bit
33. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.
Application Programming Interface
File Shadowing
Virus
Workaround Procedures
34. Standard for the establishment - implementation - control - and improvement of the Information Security Management System
Packet Filtering
ISO/IEC 27001
Revocation
Orange Book D Classification
35. Claiming another's identity at a physical level
Masquerading
Common Criteria
Disaster Recovery Tape
Electronic Vaulting
36. Uncheck data input which results in redirection
TIFF (Tagged Image File Format)
Decipher
HTTP Response Splitting
Administrative Law
37. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Wireless Fidelity (Wi-Fi )
True Attack Stimulus
Triage
Satellite
38. Line noise that is superimposed on the supply circuit.
MOM
Business Impact Assessment (BIA)
Alert
Transients
39. Periodic - automatic and transparent backup of data in bulk.
Masquerading
Electronic Vaulting
Security Kernel
Protection
40. Requirement of access to data for a clearly defined purpose
Need-To-Know
Procedure
Mobile Recovery
Pervasive Computing and Mobile Computing Devices
41. Event(s) that cause harm
Desk Check Test
Incident
False Negative
Firewall
42. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.
Journaling
Off-Site Storage
Labeling
Orange Book C Classification
43. An individuals conduct that violates government laws developed to protect the public
Certification Authority
Voice Over IP (VOIP)
Criminal Law
Routers
44. Forgery of the sender's email address in an email header.
User Mode (problem or program state)
Orange Book D Classification
E-Mail Spoofing
Data Recovery
45. Vehicle or tool that exploits a weakness
Overlapping Fragment Attack
Message Digest
Threats
Slack Space
46. A description of a database
Data Dictionary
Protection
Trade Secret
Modification
47. Object based description of a single resource and the permission each subject
Containment
Cache
Public Key Infrastructure (PKI)
Access Control Lists
48. Collection of data on business functions which determines the strategy of resiliency
Business Impact Assessment (BIA)
Remanence
CobiT
Initialization Vector
49. Abstract and mathematical in nature - defining all possible states - transitions and operations
State Machine Model
Restoration
Watermarking
Processes are Isolated By
50. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Recovery Period
Codec
Coaxial Cable
Redundant Array Of Independent Drives (RAID)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests