Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






2. A electronic attestation of identity by a certificate authority






3. To smooth out reductions or increases in power






4. Weakness or flaw in an asset






5. Written core statements that rarely change






6. With enough computing power trying all possible combinations






7. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






8. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






9. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






10. Short period of low voltage.






11. Vehicle or tool that exploits a weakness






12. Subject based description of a system or a collection of resources






13. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






14. Inference about encrypted communications






15. A state where two subjects can access the same object without proper mediation






16. Intellectual property protection for an confidential and critical process






17. More than one process in the middle of executing at a time






18. DoS - Spoofing - dictionary - brute force - wardialing






19. The first rating that requires security labels






20. Sudden rise in voltage in the power supply.






21. Try a list of words in passwords or encryption keys






22. Intermediate level - pertaining to planning






23. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






24. One of the key benefits of a network is the ability to share files stored on the server among several users.






25. A system that enforces an access control policy between two networks.






26. More than one CPU on a single board






27. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






28. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






29. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






30. To assert or claim credentialing to an authentication system






31. Line by line translation from a high level language to machine code






32. Deals with discretionary protection






33. A system designed to prevent unauthorized access to or from a private network.






34. Two certificate authorities that trust each other






35. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






36. For PKI - to store another copy of a key






37. The guardian of asset(s) - a maintenance activity






38. Something that happened






39. A software design technique for abstraction of a process






40. OOP concept of a class's details to be hidden from object






41. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






42. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






43. Recovery alternative - a building only with sufficient power - and HVAC






44. Narrow scope examination of a system






45. Someone who wants to cause harm






46. Program instructions based upon the CPU's specific architecture






47. Eight bits.






48. The event signaling an IDS to produce an alarm when no attack has taken place






49. Intellectual property protection for marketing efforts






50. A layer 3 device that used to connect two or more network segments and regulate traffic.