Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Identification and notification of an unauthorized and/or undesired action






2. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






3. Summary of a communication for the purpose of integrity






4. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






5. Interception of a communication session by an attacker.






6. Power surge






7. Induces a crime - tricks a person - and is illegal






8. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






9. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






10. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






11. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






12. Tool which mediates access






13. Renders the file inaccessible to the operating system - available to reuse for data storage.






14. High level design or model with a goal of consistency - integrity - and balance






15. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






16. Uncheck data input which results in redirection






17. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






18. Unchecked data which spills into another location in memory






19. A risk assessment method - measurable real money cost






20. The core of a computer that calculates






21. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. Pertaining to law - lending it self to one side of an argument






23. Return to a normal state






24. Effort/time needed to overcome a protective measure






25. Record of system activity - which provides for monitoring and detection.






26. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






27. A design methodology which addresses risk early and often






28. Firewalls - encryption - and access control lists






29. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






30. Unauthorized access of network devices.






31. Fault tolerance for power






32. Try a list of words in passwords or encryption keys






33. Sudden rise in voltage in the power supply.






34. A device that provides the functions of both a bridge and a router.






35. A failure of an IDS to detect an actual attack






36. Total number of keys available that may be selected by the user of a cryptosystem






37. A subnetwork with storage devices servicing all servers on the attached network.






38. A signal suggesting a system has been or is being attacked.






39. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






40. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






41. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






42. Renders the record inaccessible to the database management system






43. Planning with a goal of returning to the normal business function






44. Evidence must be: admissible - authentic - complete - accurate - and convincing






45. Inappropriate data






46. Information about data or records






47. System mediation of access with the focus on the context of the request






48. A condition in which neither party is willing to stop their activity for the other to complete






49. To segregate for the purposes of labeling






50. What is will remain - persistence







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests