Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. System of law based upon precedence - with major divisions of criminal - tort - and administrative






2. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






3. Object based description of a single resource and the permission each subject






4. A device that sequentially switches multiple analog inputs to the output.






5. The managerial approval to operate a system based upon knowledge of risk to operate






6. RADIUS - TACACS+ - Diameter






7. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






8. System directed mediation of access with labels






9. Key






10. A program with an inappropriate second purpose






11. Threats x Vulnerability x Asset Value = Total Risk






12. Reprogrammable basic startup instructions






13. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






14. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






15. Total number of keys available that may be selected by the user of a cryptosystem






16. May be responsible for overall recovery of an organization or unit(s).






17. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


18. Lower frequency noise






19. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






20. Hitting a filed down key in a lock with a hammer to open without real key






21. All of the protection mechanism in a computer system






22. High frequency noise






23. Security policy - procedures - and compliance enforcement






24. Real-time - automatic and transparent backup of data.






25. Owner directed mediation of access






26. Recording activities at the keyboard level






27. Reduction of voltage by the utility company for a prolonged period of time






28. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






29. Memory - RAM






30. Physical description on the exterior of an object that communicates the existence of a label






31. Guidelines within an organization that control the rules and configurations of an IDS






32. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






33. A software design technique for abstraction of a process






34. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






35. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






36. Sphere of influence






37. A type of attack involving attempted insertion - deletion or altering of data.






38. Encryption system using shared key/private key/single key/secret key






39. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






40. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






41. OOP concept of a class's details to be hidden from object






42. Vehicle stopping object






43. Control type- that is communication based - typically written or oral






44. People protect their domain






45. To jump to a conclusion






46. Weakness or flaw in an asset






47. Process of statistically testing a data set for the likelihood of relevant information.






48. Written step-by-step actions






49. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






50. Power surge







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests