Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OOP concept of a taking attributes from the original or parent






2. High frequency noise






3. Subject based description of a system or a collection of resources






4. Intellectual property protection for an confidential and critical process






5. A process state - to be executing a process on the CPU






6. A process state - to be either be unable to run waiting for an external event or terminated






7. Security policy - procedures - and compliance enforcement






8. OOP concept of a class's details to be hidden from object






9. Program instructions based upon the CPU's specific architecture






10. Unsolicited advertising software






11. A race condition where the security changes during the object's access






12. The core logic engine of an operating system which almost never changes






13. Independent malware that requires user interaction to execute






14. The property that data meet with a priority expectation of quality and that the data can be relied upon.






15. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware






16. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






17. An availability attack - to consume resources to the point of exhaustion from multiple vectors






18. To smooth out reductions or increases in power






19. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






20. Potentially compromising leakage of electrical or acoustical signals.






21. False memory reference






22. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






23. A form of data hiding which protects running threads of execution from using each other's memory






24. A program that waits for a condition or time to occur that executes an inappropriate activity






25. Searching for wireless networks in a moving car.






26. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






27. A design methodology which executes in a linear one way fashion






28. Power surge






29. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






30. Summary of a communication for the purpose of integrity






31. To move from location to location - keeping the same function






32. A database that contains the name - type - range of values - source and authorization for access for each data element






33. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






34. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






35. A trusted issuer of digital certificates






36. A collection of data or information that has a name






37. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






38. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






39. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






40. Something that happened






41. Forgery of the sender's email address in an email header.






42. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






43. Intellectual property protection for marketing efforts






44. Of a system without prior knowledge by the tester or the tested






45. Trading one for another






46. The partial or full duplication of data from a source database to one or more destination databases.






47. Information about data or records






48. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






49. A record that must be preserved and available for retrieval if needed.






50. A backup type which creates a complete copy







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests