SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Object based description of a single resource and the permission each subject
Access Control Lists
Non-Repudiation
Shadowing (file shadowing)
Orange Book A Classification
2. Reduces causes of fire
Cryptanalysis
Fire Prevention
Discretionary Access Control (DAC)
Security Blueprint
3. Subset of operating systems components dedicated to protection mechanisms
Corrective
Disk Mirroring
Security Kernel
ITSEC
4. Control category - more than one control on a single asset
Compensating
Data Dictionary
Salami
Cryptanalysis
5. OOP concept of a template that consist of attributes and behaviors
Hub
Masked/Interruptible
Class
Inheritance
6. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.
Intrusion Prevention Systems
Bumping
Burn
State Machine Model
7. Security policy - procedures - and compliance enforcement
Service Bureau
Examples of non-technical security components
Cross Training
Least Privilege
8. Business and technical process of applying security software updates in a regulated periodic way
Source Routing Exploitation
Disk Mirroring
Patch Management
Worldwide Interoperability for Microwave Access (WI-MAX )
9. A choice in risk management - to convince another to assume risk - typically by payment
Business Interruption
Transfer
Mandatory
Mission-Critical Application
10. Long term knowledge building
Masquerading
Rootkit
Life Cycle of Evidence
Education
11. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Electronic Vaulting
Administrative Laws
Backup
Business Interruption
12. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.
Protection
Business Continuity Steering Committee
Object Oriented Programming (OOP)
Full-Interruption test
13. Statistical probabilities of a collision are more likely than one thinks
Physical Tampering
Centralized Access Control Technologies
Fiber Optics
Birthday Attack
14. The principles a person sets for themselves to follow
Electronic Vaulting
Cross Training
Ethics
Record Level Deletion
15. Maintenance procedures outline the process for the review and update of business continuity plans.
Electromagnetic Interference (EMI)
Kerberos
Fire Detection
Plan Maintenance Procedures
16. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives
Common Criteria
Memory Management
Standard
Multilevel Security System
17. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing
Cryptovariable
Multi-Party Control
Mock Disaster
Administrative Access Controls
18. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc
Business Records
Critical Infrastructure
SQL Injection
Attacker (Black hat - Hacker)
19. For PKI - decertify an entities certificate
Key Management
Revocation
File Level Deletion
Lattice
20. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.
Call Tree
Firewalls
Control Category
Emergency Operations Center (EOC)
21. A backup type which creates a complete copy
Data Integrity
Replication
Civil Or Code Law
Territoriality
22. A layer 2 device that used to connect two network segments and regulate traffic.
Bridge
Collisions
Information Flow Model
Checksum
23. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
High-Risk Areas
Mission-Critical Application
SQL Injection
Burn
24. Impossibility of denying authenticity and identity
Non-Repudiation
File Server
Discretionary
Due Care
25. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions
Crisis
Convincing
Resumption
Technical Access Controls
26. Real-time data backup ( Data Mirroring)
Database Shadowing
Key Clustering
Cold Site
Metadata
27. Process whereby data is removed from active files and other data storage structures
Tracking
Due Care
Deletion
CobiT
28. Encryption system using shared key/private key/single key/secret key
Symmetric
Encipher
Business Continuity Steering Committee
Cipher Text
29. Outputs within a given function are the same result
Compiler
ITSEC
Collisions
Watermarking
30. Moving letters around
Worldwide Interoperability for Microwave Access (WI-MAX )
Firewall
Permutation /Transposition
Liability
31. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Coaxial Cable
Byte Level Deletion
Uninterruptible Power Supply (UPS)
Running
32. Key
Authentication
Service Bureau
Cryptovariable
Fiber Optics
33. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.
Binary
Threats
Pointer
Access Control Lists
34. Consume resources to a point of exhaustion - loss of availability
Denial Of Service
Corrective
Disaster
Security Blueprint
35. Written step-by-step actions
Procedure
Investigation
Vulnerability
Waterfall
36. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)
Forensic Copy
Exposure
Denial Of Service
Recovery Period
37. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress
Shielding
True Attack Stimulus
Recovery Point Objective (RPO)
CPU Cache
38. OOP concept of a class's details to be hidden from object
Encapsulation
Computer Forensics
Full Test (Full Interruption)
Picking
39. An attack involving the hijacking of a TCP session by predicting a sequence number.
Public Key Infrastructure (PKI)
Sequence Attacks
Redundant Array Of Independent Drives (RAID)
High-Risk Areas
40. Small data warehouse
Data Marts
Aggregation
Classification
Security Blueprint
41. Objects or programming that looks the different but act same
Polymorphism
File
Education
Alternate Data Streams (File System Forks)
42. Scrambled form of the message or data
Cipher Text
Residual Risk
Boot (V.)
JPEG (Joint Photographic Experts Group)
43. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack
Kernel
Confidence Value
Territoriality
Object
44. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.
Information Flow Model
Decipher
Quantitative Risk Analysis
Open Mail Relay Servers
45. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions
Information Owner
One Time Pad
Integrated Test
Redundant Array Of Independent Drives (RAID)
46. To smooth out reductions or increases in power
Business Unit Recovery
Plan Maintenance Procedures
UPS
Operational Test
47. Recovery alternative - complete duplication of services including personnel
Plain Text
Fire Detection
Hard Disk
Mirrored Site
48. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)
The ACID Test
Contingency Plan
Compression
Transients
49. To create a copy of data as a precaution against the loss or damage of the original data.
CobiT
Uninterruptible Power Supply (UPS)
Bollard
Backup
50. Computing power will double every 18 months
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests