Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Periodic - automatic and transparent backup of data in bulk.






2. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






3. To know more than one job






4. Recognition of an individual's assertion of identity.






5. The hard drive






6. OOP concept of an object's abilities - what it does






7. A layer 2 device that used to connect two or more network segments and regulate traffic.






8. A mail server that improperly allows inbound SMTP connections for domains it does not serve.






9. OOP concept of a taking attributes from the original or parent






10. Review of data






11. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






12. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






13. Program that inappropriately collects private data or activity






14. Mathematical function that determines the cryptographic operations






15. Creation distribution update and deletion






16. To reduce fire






17. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






18. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






19. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






20. Converts source code to an executable






21. For PKI - to store another copy of a key






22. For PKI - to have more than one person in charge of a sensitive function






23. A type of attack involving attempted insertion - deletion or altering of data.






24. Evidence must be: admissible - authentic - complete - accurate - and convincing






25. The core of a computer that calculates






26. Total number of keys available that may be selected by the user of a cryptosystem






27. A state for operating system tasks only






28. To move from location to location - keeping the same function






29. Identification and notification of an unauthorized and/or undesired action






30. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






31. Eavesdropping on network communications by a third party.






32. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






33. Third party processes used to organize the implementation of an architecture






34. Final purpose or result






35. A disturbance that degrades performance of electronic devices and electronic communications.






36. A failure of an IDS to detect an actual attack






37. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






38. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






39. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






40. Written suggestions that direct choice to a few alternatives






41. Scrambled form of the message or data






42. A protocol for the efficient transmission of voice over the Internet






43. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






44. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. Property that data is represented in the same manner at all times






46. A collection of data or information that has a name






47. Object based description of a single resource and the permission each subject






48. An individuals conduct that violates government laws developed to protect the public






49. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






50. A planned or unplanned interruption in system availability.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests