Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Object based description of a single resource and the permission each subject






2. Reduces causes of fire






3. Subset of operating systems components dedicated to protection mechanisms






4. Control category - more than one control on a single asset






5. OOP concept of a template that consist of attributes and behaviors






6. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






7. Security policy - procedures - and compliance enforcement






8. Business and technical process of applying security software updates in a regulated periodic way






9. A choice in risk management - to convince another to assume risk - typically by payment






10. Long term knowledge building






11. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






12. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






13. Statistical probabilities of a collision are more likely than one thinks






14. The principles a person sets for themselves to follow






15. Maintenance procedures outline the process for the review and update of business continuity plans.






16. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






17. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






18. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






19. For PKI - decertify an entities certificate






20. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






21. A backup type which creates a complete copy






22. A layer 2 device that used to connect two network segments and regulate traffic.






23. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






24. Impossibility of denying authenticity and identity






25. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






26. Real-time data backup ( Data Mirroring)






27. Process whereby data is removed from active files and other data storage structures






28. Encryption system using shared key/private key/single key/secret key






29. Outputs within a given function are the same result






30. Moving letters around






31. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






32. Key






33. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






34. Consume resources to a point of exhaustion - loss of availability






35. Written step-by-step actions






36. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






37. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






38. OOP concept of a class's details to be hidden from object






39. An attack involving the hijacking of a TCP session by predicting a sequence number.






40. Small data warehouse






41. Objects or programming that looks the different but act same






42. Scrambled form of the message or data






43. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






44. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






45. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






46. To smooth out reductions or increases in power






47. Recovery alternative - complete duplication of services including personnel






48. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






49. To create a copy of data as a precaution against the loss or damage of the original data.






50. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183



Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests