The CISSP Study Quiz is designed to assess knowledge in information security, focusing on business continuity, risk management, and legal frameworks. It prepares learners for the CISSP certification, enhancing their understanding of essential security principles and practices.
Floods
Environmentalist Strike
Storms
Earthquake
Rate this question:
True
False
Rate this question:
Application
Internet
Data Link
Session
Rate this question:
True
False
Rate this question:
Provides administrators and end users with the ability to access resources from a distant location
Is one of the lease exploited IT capabilities
Enforces authentication
Employs strong authentication
Rate this question:
Fail safe
Fail secure
Fail proof
Fail closed
Rate this question:
All regulatory and compliance requirements must be passed on to the provider
The outsourcing organization is free from compliance obligations
The outsourced IT systems are free from compliance obligations
The provider is free from compliance obligations
Rate this question:
Difficult to guess or unpredictable
Meet minimum length requirements
Meet specific complexity requirements
All of the above
Rate this question:
Provides mechanisms for authentication and encryption
Provides mechanisms for nonrepudiatoin
Will only be deployed with IPv6
Only authenticates clients against a server
Rate this question:
A network used solely for internal communications
An automatic security alerting tool for corporate networks
A group of dispersed, compromised machines controlled remotely for illicit reasons.
A type of virus
Rate this question:
Discretionary access control
Separation of duties
Least privilege
Rotation of duties
Rate this question:
Achieves security at the lowest cost
Reduces risk to an acceptable level
Prioritizes security for new products
Installs patches in a timely manner
Rate this question:
Map out the computing ecosystem
Identify the threats and vulnerabilities
Determine the software baseline
Identify the appropriate level of protection needs
Rate this question:
True
False
Rate this question:
Comparing hash totals to the original source
Keeping good notes
Taking pictures
Encrypted keys
Rate this question:
Present and document various elements of the security architecture in order to ensure strategic alignment
Provide an understanding of the impact on security posture of development and implementation within other domains
Support, enable, and extend security policies and standards
All of the above
Rate this question:
Spoofing
Eavesdropping
Emanations
Sniffing
Rate this question:
Outland monitoring
Inland monitoring
Ingress monitoring
Egress monitoring
Rate this question:
Consistent time-out enforcement across platforms
A compromised password exposes all authorized resources
Use of multiple passwords to remember
Password change control
Rate this question:
Business needs change; technology changes; personnel change; threats adapt and grow; constant reassessment and improvement is necessary
Metrics and reporting are required to ensure continuous improvement
Maturity models assist in determining whether an organization is focused on optimization
All of the above
Rate this question:
True
False
Rate this question:
Destroyed
Re-categorized
Degaussed
Released
Rate this question:
Deletion
Degaussing
Destruction
Overwriting
Rate this question:
Documentation
Prosecution
Containment
Investigation
Rate this question:
CCTV
HVAC
Lightning
Fire Suppression
Rate this question:
Integrity
Confidentiality
Authentication
Non-repudiation
Rate this question:
Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS)
Security as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS)
Software as a Service (SaaS), Integrity as as Service (IaaS), and Platform as a Service (PaaS)
Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Process as a Service (PaaS)
Rate this question:
Coax cable
Wireless
Shielded twisted pair
Fiber
Rate this question:
Is unique to mandatory access control
Is independent of owner input
Is based on user job functions
Can be compromised by inheritance
Rate this question:
Cold spare
Warm spare
Hot spare
Archives
Rate this question:
Secured perimeter
Defense-in-depth
Reinforced Barrier Deterrent
Reasonable Asset Protection
Rate this question:
Surveillance, deterrence, and evidentiary archives
Intrusion detection, detainment, and response
Optical scanning, infrared beaming, and lighting
Monitoring, white balancing, and inspection
Rate this question:
Substantial
Residual
Inherent
Obsolete
Rate this question:
Processor
Storage
OS
All of the above
Rate this question:
Internet devices
Internet of things
Internet of people
Interconnected homes
Rate this question:
Recovery
Administrative
Logical
Physical
Rate this question:
Malicious software (malware)
Hacker or cracker
Disgruntled employee
Auditors
Rate this question:
Domain Controller
Certificate User
Certification Authority
Public Authentication Server
Rate this question:
Host-based IDS
Network-based IDS
Vulnerability scanner
Penetration Testing
Rate this question:
Threat coupled with a breach
Threat coupled with a vulnerabilty
Vulnerability coupled with an attack
Threat coupled with a breach of security
Rate this question:
Table-top exercise
Call exercise
Simulated exercise
Halting a production application or function
Rate this question:
Single point of failure
Asymmetric key compromise
Use of dynamic passwords
Limited lifetimes for authentication credentials
Rate this question:
Full disclosure information about the threat that the patch addresses is available
The patching process is documented
The production systems are backed up
An independent third party attests the validity of the patch
Rate this question:
Hot Site
Mobile Site
Warm Site
Cold Site
Rate this question:
CCTV
HVAC
Lightning
Fire Suppression
Rate this question:
Brute force
Shoulder surfing
Dictionary
SQL Injection
Rate this question:
CHAP
PAP
TACACS
Kerberos
Rate this question:
Deletion
Degaussing
Destruction
Overwriting
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.