Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Record of system activity - which provides for monitoring and detection.






2. Those who initiate the attack






3. Asymmetric encryption of a hash of message






4. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






5. Can be statistical (monitor behavior) or signature based (watch for known attacks)






6. Act of scrambling the cleartext message by using a key.






7. A process state - to be either be unable to run waiting for an external event or terminated






8. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






9. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






10. Malware that makes many small changes over time to a single data point or system






11. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






12. Recognition of an individual's assertion of identity.






13. The study of cryptography and cryptanalysis






14. An individuals conduct that violates government laws developed to protect the public






15. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






16. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






17. Something that happened






18. The principles a person sets for themselves to follow






19. Communication of a security incident to stakeholders and data owners.






20. Dedicated fast memory located on the same board as the CPU






21. Uncleared buffers or media






22. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






23. A description of a database






24. Recovery alternative - short-term - high cost movable processing location






25. Record history of incident






26. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






27. A trusted issuer of digital certificates






28. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






30. OOP concept of a taking attributes from the original or parent






31. One way encryption






32. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


33. Deals with discretionary protection






34. A test conducted on one or more components of a plan under actual operating conditions.






35. To segregate for the purposes of labeling






36. Subject based description of a system or a collection of resources






37. A technology that reduces the size of a file.






38. To load the first piece of software that starts a computer.






39. Review of data






40. What is will remain - persistence






41. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






42. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






43. Object based description of a single resource and the permission each subject






44. All of the protection mechanism in a computer system






45. A programming design concept which abstracts one set of functions from another in a serialized fashion






46. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






47. A program that waits for a condition or time to occur that executes an inappropriate activity






48. Unused storage capacity






49. A mobilized resource purchased or contracted for the purpose of business recovery.






50. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests