Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. System of law based upon what is good for society






2. Interception of a communication session by an attacker.






3. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






4. A program with an inappropriate second purpose






5. Requirement to take time off






6. Granular decision by a system of permitting or denying access to a particular resource on the system






7. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






8. A world-wide wireless technology






9. An individuals conduct that violates government laws developed to protect the public






10. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






11. Initial surge of current






12. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






13. A collection of information designed to reduce duplication and increase integrity






14. A device that converts between digital and analog representation of data.






15. Induces a crime - tricks a person - and is illegal






16. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






17. Effort/time needed to overcome a protective measure






18. The property that data meet with a priority expectation of quality and that the data can be relied upon.






19. Asymmetric encryption of a hash of message






20. Intellectual property protection for an confidential and critical process






21. A mobilized resource purchased or contracted for the purpose of business recovery.






22. A subnetwork with storage devices servicing all servers on the attached network.






23. Unauthorized wireless network access device.






24. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






25. OOP concept of an object's abilities - what it does






26. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






27. Controls for logging and alerting






28. Control category- to discourage an adversary from attempting to access






29. May be responsible for overall recovery of an organization or unit(s).






30. Outputs within a given function are the same result






31. DoS - Spoofing - dictionary - brute force - wardialing






32. Intellectual property protection for an invention






33. A test conducted on one or more components of a plan under actual operating conditions.






34. Consume resources to a point of exhaustion - loss of availability






35. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






36. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






37. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






38. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






39. Claiming another's identity at a physical level






40. The hard drive






41. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Binary decision by a system of permitting or denying access to the entire system






43. A state for operating system tasks only






44. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






45. To set the clearance of a subject or the classification of an object






46. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






47. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






48. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






49. The problems solving state - the opposite of supervisor mode






50. Used to code/decode a digital data stream.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests