Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Initial surge of current






2. Recovery alternative - short-term - high cost movable processing location






3. Provides a physical cross connect point for devices.






4. Less granular organization of controls -






5. Written suggestions that direct choice to a few alternatives






6. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






7. Long term knowledge building






8. Low level - pertaining to planning






9. Program instructions based upon the CPU's specific architecture






10. Encryption system using a pair of mathematically related unequal keys






11. Employment education done once per position or at significant change of function






12. Eavesdropping on network communications by a third party.






13. The event signaling an IDS to produce an alarm when no attack has taken place






14. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






15. Hiding the fact that communication has occurred






16. Two different keys decrypt the same cipher text






17. For PKI - to store another copy of a key






18. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






19. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






20. A subnetwork with storage devices servicing all servers on the attached network.






21. Recovery alternative - complete duplication of services including personnel






22. A electronic attestation of identity by a certificate authority






23. To know more than one job






24. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






25. Two certificate authorities that trust each other






26. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






27. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






28. To set the clearance of a subject or the classification of an object






29. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






30. An availability attack - to consume resources to the point of exhaustion






31. An unintended communication path






32. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






33. Creation distribution update and deletion






34. Lower frequency noise






35. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






36. Renders the record inaccessible to the database management system






37. Deals with discretionary protection






38. Final purpose or result






39. A design methodology which executes in a linear one way fashion






40. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






41. The core of a computer that calculates






42. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






43. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






44. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






45. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






46. Process of statistically testing a data set for the likelihood of relevant information.






47. Potentially compromising leakage of electrical or acoustical signals.






48. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






49. Weakness or flaw in an asset






50. Information that - if made public or even shared around the organization - could seriously impede the organization's operations







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests