SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Certified Information Systems Security Professional
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A documented battle plan for coordinating response to incidents.
Incident Handling
Incident Response
Stopped
Instance
2. OOP concept of an object at runtime
Tar Pits
Honeypot
Fire Suppression
Instance
3. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal
TIFF (Tagged Image File Format)
System Life Cycle
Sag/Dip
Pointer
4. Of a system without prior knowledge by the tester or the tested
Marking
Double Blind Testing
Acronym for American Standard Code for Information Interchange (ASCII)
Plan Maintenance Procedures
5. A programming design concept which abstracts one set of functions from another in a serialized fashion
Access Control
Layering
Recovery Period
Total Risk
6. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.
Phishing
Governance
Activation
Hot Spares
7. Collection of data on business functions which determines the strategy of resiliency
Machine Language (Machine Code)
Business Impact Assessment (BIA)
Digital Signature
The ACID Test
8. Redundant component that provides failover capability in the event of failure or interruption of a primary component.
Pointer
Hot Spares
Quantitative
Consistency
9. OOP concept of a distinct copy of the class
Supervisor Mode (monitor - system - privileged)
Embedded
Simulation
Object
10. Lower frequency noise
Collisions
Radio Frequency Interference (RFI)
Digital Signature
Phishing
11. The principles a person sets for themselves to follow
Analysis
Ethics
Masked/Interruptible
Side Channel Attack
12. Someone who wants to cause harm
Multi-Core
Common Law
Job Rotation
Attacker (Black hat - Hacker)
13. Individuals and departments responsible for the storage and safeguarding of computerized data.
Data Custodian
Hearsay
Interception
Multi-Tasking
14. To break a business process into separate functions and assign to different people
Information Owner
Confidence Value
Business Interruption Insurance
Separation Of Duties
15. Searching for wireless networks in a moving car.
Internal Use Only
Network Attached Storage (NAS)
Fault
War Driving
16. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.
Education
Internal Use Only
Exposure
Running Key
17. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.
Embedded Systems
Critical Records
HTTP Response Splitting
Buffer Overflow
18. System mediation of access with the focus on the context of the request
Radio Frequency Interference (RFI)
Content Dependent Access Control
Marking
Electronic Vaulting
19. Hardware or software that is part of a larger system
Bollard
CPU Cache
Remanence
Embedded
20. All of the protection mechanism in a computer system
Degauss
Trusted Computing Base
User
Uninterruptible Power Supply (UPS)
21. Controls for logging and alerting
Checksum
Intrusion Detection Systems
Object
Source Routing Exploitation
22. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.
Hard Disk
Distributed Denial Of Service
Disaster Recovery Tape
Business Interruption
23. To create a copy of data as a precaution against the loss or damage of the original data.
Data Warehouse
Journaling
Security Blueprint
Backup
24. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.
Relocation
Private Branch Exchange (PBX)
Open Mail Relay Servers
Privacy Laws
25. A database backup type which records at the transaction level
Mirrored Site
Guidelines
File Sharing
Remote Journaling
26. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor
Elements of Negligence
Coaxial Cable
Data Warehouse
Spyware
27. Initial surge of current
Inrush Current
Databases
Adware
Authorization
28. Potentially compromising leakage of electrical or acoustical signals.
Framework
Emanations
Incident Handling
Access Control Lists
29. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.
Multilevel Security System
Physical Tampering
JPEG (Joint Photographic Experts Group)
Proxies
30. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).
Discretionary Access Control (DAC)
DR Or BC Coordinator
Durability
Qualitative
31. Controls deployed to avert unauthorized and/or undesired actions.
ISO/IEC 27001
Sag/Dip
Orange Book B2 Classification
Prevention
32. Tool which mediates access
Top Secret
Control
5 Rules Of Evidence
Electronic Vaulting
33. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.
Classification Scheme
Mission-Critical Application
Slack Space
Targeted Testing
34. DoS - Spoofing - dictionary - brute force - wardialing
Payload
Degauss
Consistency
Access Control Attacks
35. Reduces causes of fire
Centralized Access Control Technologies
Fire Prevention
File Server
Change Control
36. For PKI - to store another copy of a key
Microwave
Accountability
Key Escrow
Privacy Laws
37. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.
Basics Of Secure Design
Salami
Orange Book A Classification
Restoration
38. Property that data is represented in the same manner at all times
Locard's Principle
Crisis
Consistency
Eavesdropping
39. Is secondhand and usually not admissible in court
Emergency
Switches
Keyed-Hashing For Message Authentication
Hearsay Evidence
40. Memory - RAM
Digital Certificate
War Driving
Primary Storage
Architecture
41. A system designed to prevent unauthorized access to or from a private network.
Data Owner
Incident Manager
Locard's Principle
Firewall
42. To assert or claim credentialing to an authentication system
Electrostatic Discharge
Multi-Programming
Identification
Test Plan
43. To smooth out reductions or increases in power
Qualitative
UPS
Security Kernel
Forward Recovery
44. Written step-by-step actions
Assembler
Marking
Procedure
Distributed Denial Of Service
45. A failure of an IDS to detect an actual attack
Key Space
Coaxial Cable
Copyright
False Negative
46. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.
Standalone Test
TCSEC (Orange Book)
Interference (Noise)
Satellite
47. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk
Shadowing (file shadowing)
Information Risk Management (IRM)
Proxies
Tapping
48. Program instructions based upon the CPU's specific architecture
CobiT
Emergency Procedures
Machine Language (Machine Code)
Trusted Computing Base
49. Recovery alternative - everything needed for the business function - except people and last backup
Rootkit
Hot Site
Corrective
Polymorphism
50. Small data files written to a user's hard drive by a web server.
Deterrent
Job Training
Cookie
Multiplexers
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests