Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Firewalls - encryption - and access control lists






2. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination






3. The hard drive






4. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






5. Granular decision by a system of permitting or denying access to a particular resource on the system






6. Total number of keys available that may be selected by the user of a cryptosystem






7. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






8. Maintenance procedures outline the process for the review and update of business continuity plans.






9. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






10. Intellectual property management technique for identifying after distribution






11. Using many alphabets






12. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






13. Control category- to restore to a previous state by removing the adversary and or the results of their actions






14. Business and technical process of applying security software updates in a regulated periodic way






15. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






16. For PKI - to store another copy of a key






17. Subject based description of a system or a collection of resources






18. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






19. A technology that reduces the size of a file.






20. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






21. System directed mediation of access with labels






22. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






23. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






24. An encryption method that has a key as long as the message






25. Independent malware that requires user interaction to execute






26. A type of attack involving attempted insertion - deletion or altering of data.






27. The study of cryptography and cryptanalysis






28. Inappropriate data






29. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






30. Potential danger to information or systems






31. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






32. People who interact with assets






33. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






34. Part of a transaction control for a database which informs the database of the last recorded transaction






35. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






36. Memory management technique which allows data to be moved from one memory address to another






37. A physical enclosure for verifying identity before entry to a facility






38. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






39. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






40. Property that data is represented in the same manner at all times






41. A documented battle plan for coordinating response to incidents.






42. Organized group of compromised computers






43. Responsibility of a user for the actions taken by their account which requires unique identification






44. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






45. Asymmetric encryption of a hash of message






46. A mail server that improperly allows inbound SMTP connections for domains it does not serve.






47. A control after attack






48. False memory reference






49. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






50. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests