Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






2. Uncheck data input which results in redirection






3. Natural or human-readable form of message






4. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






5. Malware that makes small random changes to many data points






6. A device that converts between digital and analog representation of data.






7. Unused storage capacity






8. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






9. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






10. A programming design concept which abstracts one set of functions from another in a serialized fashion






11. A electronic attestation of identity by a certificate authority






12. System of law based upon precedence - with major divisions of criminal - tort - and administrative






13. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






14. Control category- to discourage an adversary from attempting to access






15. A back up type - where the organization has excess capacity in another location.






16. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






17. What is will remain - persistence






18. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






19. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






20. Those who initiate the attack






21. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






22. Responsibility of a user for the actions taken by their account which requires unique identification






23. Summary of a communication for the purpose of integrity






24. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






25. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






26. A device that provides the functions of both a bridge and a router.






27. A group or network of honeypots






28. An event which stops business from continuing.






29. The technical and risk assesment of a system within the context of the operating environment






30. To load the first piece of software that starts a computer.






31. Control category- to give instructions or inform






32. Planning with a goal of returning to the normal business function






33. Quantity of risk remaining after a control is applied






34. High degree of visual control






35. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






36. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






37. Pertaining to law - accepted by a court






38. More than one process in the middle of executing at a time






39. Unsolicited advertising software






40. A layer 2 device that used to connect two or more network segments and regulate traffic.






41. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






42. Maximum tolerance for loss of certain business function - basis of strategy






43. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






44. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






45. Pertaining to law - no omissions






46. False memory reference






47. To set the clearance of a subject or the classification of an object






48. Objects or programming that looks the different but act same






49. To evaluate the current situation and make basic decisions as to what to do






50. Weak evidence







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests