Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






2. Firewalls - encryption - and access control lists






3. Small data files written to a user's hard drive by a web server.






4. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






5. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






6. Intellectual property protection for the expression of an idea






7. High frequency noise






8. A unit of execution






9. A backup of data located where staff can gain access immediately






10. Written suggestions that direct choice to a few alternatives






11. The connection between a wireless and wired network.






12. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






13. To jump to a conclusion






14. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






15. Property that data is represented in the same manner at all times






16. Scrambled form of the message or data






17. A documented battle plan for coordinating response to incidents.






18. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






19. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






20. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






21. A choice in risk management - to convince another to assume risk - typically by payment






22. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






23. Intellectual property protection for an confidential and critical process






24. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






25. Memory management technique which allows subjects to use the same resource






26. Mathematical function that determines the cryptographic operations






27. Planning with a goal of returning to the normal business function






28. Claiming another's identity at a physical level






29. One entity with two competing allegiances






30. Wrong against society






31. Unchecked data which spills into another location in memory






32. To know more than one job






33. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.






34. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






35. A passive network attack involving monitoring of traffic.






36. Object based description of a system or a collection of resources






37. System mediation of access with the focus on the context of the request






38. For PKI - to store another copy of a key






39. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






40. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






41. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






42. Provides a physical cross connect point for devices.






43. System directed mediation of access with labels






44. Uncheck data input which results in redirection






45. Reduction of voltage by the utility company for a prolonged period of time






46. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. To move from location to location - keeping the same function






48. Location where coordination and execution of BCP or DRP is directed






49. A Denial of Service attack that floods the target system with connection requests that are not finalized.






50. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests