Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A condition in which neither party is willing to stop their activity for the other to complete






2. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






3. Short period of low voltage.






4. Mitigate damage by isolating compromised systems from the network.






5. A description of a database






6. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






7. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






8. Use of specialized techniques for recovery - authentication - and analysis of electronic data






9. Tool which mediates access






10. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






11. System mediation of access with the focus on the context of the request






12. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






13. Moving letters around






14. Most granular organization of controls






15. Object based description of a system or a collection of resources






16. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






17. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






18. A programming device use in development to circumvent controls






19. A back up type - where the organization has excess capacity in another location.






20. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






21. Physical description on the exterior of an object that communicates the existence of a label






22. A hash that has been further encrypted with a symmetric algorithm






23. High frequency noise






24. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






25. The technical and risk assesment of a system within the context of the operating environment






26. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


27. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






28. A type a computer memory that temporarily stores frequently used information for quick access.






29. People who interact with assets






30. Control type- that is communication based - typically written or oral






31. To move from location to location - keeping the same function






32. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






33. Subjects will not interact with each other's objects






34. One of the key benefits of a network is the ability to share files stored on the server among several users.






35. More than one processor sharing same memory - also know as parallel systems






36. Guidelines within an organization that control the rules and configurations of an IDS






37. Less granular organization of controls -






38. Individuals and departments responsible for the storage and safeguarding of computerized data.






39. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






40. Written internalized or nationalized norms that are internal to an organization






41. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






42. Regular operations are stopped and where processing is moved to the alternate site.






43. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






44. Code breaking - practice of defeating the protective properties of cryptography.






45. An attack involving the hijacking of a TCP session by predicting a sequence number.






46. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






47. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.






48. A process state - to be executing a process on the CPU






49. Sudden rise in voltage in the power supply.






50. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests