Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An unintended communication path






2. Moving the alphabet intact a certain number spaces






3. OOP concept of a class's details to be hidden from object






4. Responsibility of a user for the actions taken by their account which requires unique identification






5. A device that sequentially switches multiple analog inputs to the output.






6. Recognition of an individual's assertion of identity.






7. Recovery alternative which includes cold site and some equipment and infrastructure is available






8. A disturbance that degrades performance of electronic devices and electronic communications.






9. A secure connection to another network.






10. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






11. A layer 3 device that used to connect two or more network segments and regulate traffic.






12. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






13. Real-time - automatic and transparent backup of data.






14. Renders the record inaccessible to the database management system






15. Pertaining to law - verified as real






16. Act of luring an intruder and is legal.






17. A protocol for the efficient transmission of voice over the Internet






18. Tool which mediates access






19. What is will remain - persistence






20. Written suggestions that direct choice to a few alternatives






21. A world-wide wireless technology






22. Can be statistical (monitor behavior) or signature based (watch for known attacks)






23. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






24. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






25. A backup type - for databases at a point in time






26. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






27. Unsolicited commercial email






28. Interception of a communication session by an attacker.






29. Define the way in which the organization operates.






30. Written step-by-step actions






31. DoS - Spoofing - dictionary - brute force - wardialing






32. A one way - directed graph which indicates confidentiality or integrity flow






33. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






34. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






35. Mitigate damage by isolating compromised systems from the network.






36. One way encryption






37. Communicate to stakeholders






38. Data or interference that can trigger a false positive






39. To know more than one job






40. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






41. For PKI - to store another copy of a key






42. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






43. A state for operating system tasks only






44. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






45. A planned or unplanned interruption in system availability.






46. A test conducted on one or more components of a plan under actual operating conditions.






47. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






48. Deals with discretionary protection






49. A description of a database






50. Encryption system using shared key/private key/single key/secret key







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests