Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program with an inappropriate second purpose






2. Subject based description of a system or a collection of resources






3. Another subject cannot see an ongoing or pending update until it is complete






4. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






5. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






6. Highest level of authority at EOC with knowledge of the business process and the resources available






7. Intellectual property protection for marketing efforts






8. State of computer - to be running a process






9. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






10. To reduce sudden rises in current






11. Disruption of operation of an electronic device due to a competing electromagnetic field.






12. Pertaining to law - lending it self to one side of an argument






13. Small data warehouse






14. Independent malware that requires user interaction to execute






15. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






16. Pertaining to law - no omissions






17. Define the way in which the organization operates.






18. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






19. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






20. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






21. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






22. Actions measured against either a policy or what a reasonable person would do






23. Creation distribution update and deletion






24. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






25. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






26. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






27. A control after attack






28. A design methodology which executes in a linear one way fashion






29. Uncleared buffers or media






30. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






31. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






32. System mediation of access with the focus on the context of the request






33. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






34. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






36. Mathematical function that determines the cryptographic operations






37. A collection of data or information that has a name






38. High level design or model with a goal of consistency - integrity - and balance






39. Unauthorized access of network devices.






40. Someone who wants to cause harm






41. Joining two pieces of text






42. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






43. A programming design concept which abstracts one set of functions from another in a serialized fashion






44. A protocol for the efficient transmission of voice over the Internet






45. Try a list of words in passwords or encryption keys






46. The partial or full duplication of data from a source database to one or more destination databases.






47. The core of a computer that calculates






48. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






49. Substitution at the word or phrase level






50. A device that converts between digital and analog representation of data.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests