Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Asymmetric encryption of a hash of message






2. Interception of a communication session by an attacker.






3. Recording activities at the keyboard level






4. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






5. Deals with discretionary protection






6. Joining two pieces of text






7. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






8. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






9. Mitigation of system or component loss or interruption through use of backup capability.






10. Prolonged loss of commercial power






11. The core of a computer that calculates






12. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






13. A template for the designing the architecture






14. Owner directed mediation of access






15. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






16. A running key using a random key that is never used again






17. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






18. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






19. A process state - to be executing a process on the CPU






20. To know more than one job






21. A program with an inappropriate second purpose






22. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






23. A protocol for the efficient transmission of voice over the Internet






24. A process state - to be either be unable to run waiting for an external event or terminated






25. Planning for the delegation of authority required when decisions must be made without the normal chain of command






26. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






27. Record history of incident






28. Guidelines within an organization that control the rules and configurations of an IDS






29. A form of data hiding which protects running threads of execution from using each other's memory






30. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






31. The principles a person sets for themselves to follow






32. An unintended communication path






33. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






34. Is secondhand and usually not admissible in court






35. A process state - (blocked) needing input before continuing






36. Highest level of authority at EOC with knowledge of the business process and the resources available






37. Object reuse protection and auditing






38. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






39. An alert or alarm that is triggered when no actual attack has taken place






40. A hash that has been further encrypted with a symmetric algorithm






41. To stop damage from spreading






42. An availability attack - to consume resources to the point of exhaustion






43. Some systems are actually run at the alternate site






44. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






45. Mitigate damage by isolating compromised systems from the network.






46. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






47. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






48. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






49. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


50. Impossibility of denying authenticity and identity







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests