Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An alert or alarm that is triggered when no actual attack has taken place






2. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






3. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






4. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






5. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.






6. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






7. A collection of data or information that has a name






8. Evidence must be: admissible - authentic - complete - accurate - and convincing






9. A program with an inappropriate second purpose






10. Firewalls - encryption - and access control lists






11. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






12. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






13. The principles a person sets for themselves to follow






14. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






15. Wrong against society






16. Provides a physical cross connect point for devices.






17. Use of specialized techniques for recovery - authentication - and analysis of electronic data






18. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






19. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






20. A test conducted on one or more components of a plan under actual operating conditions.






21. Induces a crime - tricks a person - and is illegal






22. Total number of keys available that may be selected by the user of a cryptosystem






23. Weakness or flaw in an asset






24. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






25. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. To reduce sudden rises in current






27. Tool which mediates access






28. A protocol for the efficient transmission of voice over the Internet






29. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






30. A system that enforces an access control policy between two networks.






31. Review of data






32. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






33. Converts a high level language into machine language






34. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






35. The chance that something negative will occur






36. Control type- that is communication based - typically written or oral






37. Object based description of a system or a collection of resources






38. A legal enforceable agreement between: two people - two organizations - a person and an organization.






39. Identification and notification of an unauthorized and/or undesired action






40. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






41. A signal suggesting a system has been or is being attacked.






42. Fault tolerance for power






43. Forgery of the sender's email address in an email header.






44. Code breaking - practice of defeating the protective properties of cryptography.






45. Planning with a goal of returning to the normal business function






46. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






47. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






48. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






49. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






50. Collection of data on business functions which determines the strategy of resiliency







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests