Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Return to a normal state






2. A set of laws that the organization agrees to be bound by






3. Individuals and departments responsible for the storage and safeguarding of computerized data.






4. The connection between a wireless and wired network.






5. A layer 2 device that used to connect two or more network segments and regulate traffic.






6. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






7. Mathematical function that determines the cryptographic operations






8. Moving the alphabet intact a certain number spaces






9. Trading one for another






10. Pertaining to law - verified as real






11. Intellectual property protection for the expression of an idea






12. Intellectual property protection for an invention






13. Use of specialized techniques for recovery - authentication - and analysis of electronic data






14. An availability attack - to consume resources to the point of exhaustion from multiple vectors






15. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






16. Potential danger to information or systems






17. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






18. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






19. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






20. OOP concept of a taking attributes from the original or parent






21. Memory - RAM






22. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






23. Requirement to take time off






24. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






25. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






26. Outputs within a given function are the same result






27. Intellectual property protection for marketing efforts






28. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






29. Potentially retrievable data residue that remains following intended erasure of data.






30. High degree of visual control






31. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






32. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






33. Property that data is represented in the same manner at all times






34. Intellectual property protection for an confidential and critical process






35. Memory management technique which allows subjects to use the same resource






36. A computer designed for the purpose of studying adversaries






37. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.






38. Recording activities at the keyboard level






39. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.






40. Subject based description of a system or a collection of resources






41. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






42. A description of a database






43. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






44. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






45. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






46. Induces a crime - tricks a person - and is illegal






47. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






48. Control category- to restore to a previous state by removing the adversary and or the results of their actions






49. Hardware or software that is part of a larger system






50. Written step-by-step actions







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests