Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A electronic attestation of identity by a certificate authority






2. A database backup type which records at the transaction level






3. Control category- to discourage an adversary from attempting to access






4. Act of scrambling the cleartext message by using a key.






5. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






6. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






7. A device that provides the functions of both a bridge and a router.






8. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






9. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






10. Memory - RAM






11. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






12. Collection of data on business functions which determines the strategy of resiliency






13. Fault tolerance for power






14. Unauthorized wireless network access device.






15. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






16. Control type- that is communication based - typically written or oral






17. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






18. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






19. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






20. An availability attack - to consume resources to the point of exhaustion from multiple vectors






21. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






22. Mediation of covert channels must be addressed






23. Interception of a communication session by an attacker.






24. Real-time data backup ( Data Mirroring)






25. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






26. Guidelines within an organization that control the rules and configurations of an IDS






27. A unit of execution






28. Reduces causes of fire






29. Owner directed mediation of access






30. A mathematical tool for verifying no unintentional changes have been made






31. A set of laws that the organization agrees to be bound by






32. Converts source code to an executable






33. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






34. Location to perform the business function






35. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






36. OOP concept of an object at runtime






37. To reduce sudden rises in current






38. Location where coordination and execution of BCP or DRP is directed






39. For PKI - decertify an entities certificate






40. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






41. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






42. Try a list of words in passwords or encryption keys






43. A record that must be preserved and available for retrieval if needed.






44. Line by line translation from a high level language to machine code






45. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






46. A backup of data located where staff can gain access immediately






47. Lower frequency noise






48. Objects or programming that looks the different but act same






49. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






50. A back up type - where the organization has excess capacity in another location.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests