Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Natural or human-readable form of message






2. Unauthorized wireless network access device.






3. Memory management technique that allows two processes to run concurrently without interaction






4. The collection and summation of risk data relating to a particular asset and controls for that asset






5. Interception of a communication session by an attacker.






6. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






7. The technical and risk assesment of a system within the context of the operating environment






8. Use of specialized techniques for recovery - authentication - and analysis of electronic data






9. A record that must be preserved and available for retrieval if needed.






10. More than one CPU on a single board






11. Searching for wireless networks in a moving car.






12. Identification and notification of an unauthorized and/or undesired action






13. A mathematical tool for verifying no unintentional changes have been made






14. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






15. Potentially compromising leakage of electrical or acoustical signals.






16. Induces a crime - tricks a person - and is illegal






17. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






18. Written core statements that rarely change






19. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






20. Power surge






21. Unsolicited advertising software






22. Calculation encompassing threats - vulnerabilities and assets






23. Prolonged loss of commercial power






24. With enough computing power trying all possible combinations






25. Binary decision by a system of permitting or denying access to the entire system






26. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






27. Hiding the fact that communication has occurred






28. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






29. Creation distribution update and deletion






30. An unintended communication path






31. Small data files written to a user's hard drive by a web server.






32. A distributed system's transaction control that requires updates to complete or rollback






33. An encryption method that has a key as long as the message






34. High level design or model with a goal of consistency - integrity - and balance






35. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






36. A backup type - for databases at a point in time






37. A failure of an IDS to detect an actual attack






38. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


39. An event which stops business from continuing.






40. Joining two pieces of text






41. The property that data meet with a priority expectation of quality and that the data can be relied upon.






42. Code making






43. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






44. A planned or unplanned interruption in system availability.






45. The partial or full duplication of data from a source database to one or more destination databases.






46. One of the key benefits of a network is the ability to share files stored on the server among several users.






47. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






48. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






49. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






50. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests