Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






2. A subnetwork with storage devices servicing all servers on the attached network.






3. With enough computing power trying all possible combinations






4. Binary decision by a system of permitting or denying access to the entire system






5. Highest level of authority at EOC with knowledge of the business process and the resources available






6. The one person responsible for data - its classification and control setting






7. Scrambled form of the message or data






8. Representatives from each functional area or department get together and walk through the plan from beginning to end.






9. A choice in risk management - to convince another to assume risk - typically by payment






10. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






11. Malware that subverts the detective controls of an operating system






12. Written core statements that rarely change






13. Hardware or software that is part of a larger system






14. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






15. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






16. Intellectual property protection for an invention






17. A Denial of Service attack that floods the target system with connection requests that are not finalized.






18. OOP concept of an object's abilities - what it does






19. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






20. Security policy - procedures - and compliance enforcement






21. Requirement of access to data for a clearly defined purpose






22. Organized group of compromised computers






23. An attack involving the hijacking of a TCP session by predicting a sequence number.






24. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






25. Alerts personnel to the presence of a fire






26. A backup of data located where staff can gain access immediately






27. Controls for termination of attempt to access object






28. High level design or model with a goal of consistency - integrity - and balance






29. Policy or stated actions






30. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






31. Recovery alternative - short-term - high cost movable processing location






32. Recovery alternative which includes cold site and some equipment and infrastructure is available






33. Controls for logging and alerting






34. RADIUS - TACACS+ - Diameter






35. Written step-by-step actions






36. Planning with a goal of returning to the normal business function






37. The core of a computer that calculates






38. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






39. An asymmetric cryptography mechanism that provides authentication.






40. An individuals conduct that violates government laws developed to protect the public






41. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. A failure of an IDS to detect an actual attack






43. A documented battle plan for coordinating response to incidents.






44. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






45. Transaction controls for a database - a return to a previous state






46. An event which stops business from continuing.






47. To assert or claim credentialing to an authentication system






48. A technology that reduces the size of a file.






49. Pertaining to law - verified as real






50. A one way - directed graph which indicates confidentiality or integrity flow







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests