Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mitigate damage by isolating compromised systems from the network.






2. To assert or claim credentialing to an authentication system






3. Periodic - automatic and transparent backup of data in bulk.






4. OOP concept of an object at runtime






5. The first rating that requires security labels






6. To evaluate the current situation and make basic decisions as to what to do






7. To smooth out reductions or increases in power






8. High level - pertaining to planning






9. The technical and risk assesment of a system within the context of the operating environment






10. A type of multitasking that allows for more even distribution of computing time among competing request






11. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






12. Intellectual property protection for an confidential and critical process






13. A covert storage channel on the file attribute






14. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






15. Process of statistically testing a data set for the likelihood of relevant information.






16. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






17. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






18. A backup type - for databases at a point in time






19. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. OOP concept of a distinct copy of the class






21. Requirement of access to data for a clearly defined purpose






22. Firewalls - encryption - and access control lists






23. Identification and notification of an unauthorized and/or undesired action






24. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






25. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






26. A device that converts between digital and analog representation of data.






27. A distributed system's transaction control that requires updates to complete or rollback






28. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






29. A running key using a random key that is never used again






30. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






31. Pertaining to law - lending it self to one side of an argument






32. Encryption system using shared key/private key/single key/secret key






33. A signal suggesting a system has been or is being attacked.






34. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






35. OOP concept of a template that consist of attributes and behaviors






36. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






37. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






38. Written internalized or nationalized norms that are internal to an organization






39. A trusted issuer of digital certificates






40. To load the first piece of software that starts a computer.






41. State of computer - to be running a process






42. With enough computing power trying all possible combinations






43. Record of system activity - which provides for monitoring and detection.






44. A design methodology which addresses risk early and often






45. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






46. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






47. Renders the file inaccessible to the operating system - available to reuse for data storage.






48. Eavesdropping on network communications by a third party.






49. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






50. One way encryption






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests