Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






2. Pertaining to law - lending it self to one side of an argument






3. A planned or unplanned interruption in system availability.






4. Encryption system using a pair of mathematically related unequal keys






5. Written core statements that rarely change






6. Specific format of technical and physical controls that support the chosen framework and the architecture






7. Control category- to discourage an adversary from attempting to access






8. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






9. Uncleared buffers or media






10. Momentary loss of power






11. A state where two subjects can access the same object without proper mediation






12. Mediation of covert channels must be addressed






13. A layer 2 device that used to connect two or more network segments and regulate traffic.






14. A design methodology which executes in a linear one way fashion






15. The principles a person sets for themselves to follow






16. For PKI - to store another copy of a key






17. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






18. Renders the record inaccessible to the database management system






19. Line noise that is superimposed on the supply circuit.






20. A shield against leakage of electromagnetic signals.






21. Potentially compromising leakage of electrical or acoustical signals.






22. A database backup type which records at the transaction level






23. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






24. Controls for logging and alerting






25. To execute more than one instruction at an instant in time






26. Potential danger to information or systems






27. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






28. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






29. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






30. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






31. Creation distribution update and deletion






32. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






33. Fault tolerance for power






34. Impossibility of denying authenticity and identity






35. A Denial of Service attack that floods the target system with connection requests that are not finalized.






36. Subjects will not interact with each other's objects






37. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






38. The property that data meet with a priority expectation of quality and that the data can be relied upon.






39. System mediation of access with the focus on the context of the request






40. Forging of an IP address.






41. Measures followed to restore critical functions following a security incident.






42. A running key using a random key that is never used again






43. For PKI - to have more than one person in charge of a sensitive function






44. Recovery alternative which includes cold site and some equipment and infrastructure is available






45. Potentially retrievable data residue that remains following intended erasure of data.






46. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






47. May be responsible for overall recovery of an organization or unit(s).






48. Process of statistically testing a data set for the likelihood of relevant information.






49. Written step-by-step actions






50. Memory management technique that allows two processes to run concurrently without interaction







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests