Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unsolicited advertising software






2. A type of multitasking that allows for more even distribution of computing time among competing request






3. Provides a physical cross connect point for devices.






4. Hitting a filed down key in a lock with a hammer to open without real key






5. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






6. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






7. A type of attack involving attempted insertion - deletion or altering of data.






8. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






9. More than one processor sharing same memory - also know as parallel systems






10. An availability attack - to consume resources to the point of exhaustion






11. Code breaking - practice of defeating the protective properties of cryptography.






12. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






13. Eavesdropping on network communications by a third party.






14. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






15. An alert or alarm that is triggered when no actual attack has taken place






16. Can be statistical (monitor behavior) or signature based (watch for known attacks)






17. Recovery alternative - everything needed for the business function - except people and last backup






18. Eight bits.






19. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






20. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






21. Reduces causes of fire






22. A planned or unplanned interruption in system availability.






23. A database that contains the name - type - range of values - source and authorization for access for each data element






24. Act of scrambling the cleartext message by using a key.






25. The problems solving state - the opposite of supervisor mode






26. A state where two subjects can access the same object without proper mediation






27. A collection of information designed to reduce duplication and increase integrity






28. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






29. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






30. Vehicle or tool that exploits a weakness






31. Firewalls - encryption - and access control lists






32. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






33. The guardian of asset(s) - a maintenance activity






34. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






35. Real-time - automatic and transparent backup of data.






36. Data or interference that can trigger a false positive






37. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






38. Forgery of the sender's email address in an email header.






39. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






40. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






41. Actions measured against either a policy or what a reasonable person would do






42. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






43. Alerts personnel to the presence of a fire






44. A program that waits for a condition or time to occur that executes an inappropriate activity






45. Dedicated fast memory located on the same board as the CPU






46. Wrong against society






47. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






48. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






49. Renders the record inaccessible to the database management system






50. Claiming another's identity at a physical level







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests