Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Interception of a communication session by an attacker.






2. Dedicated fast memory located on the same board as the CPU






3. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






4. A risk assessment method - intrinsic value






5. To reduce fire






6. Process whereby data is removed from active files and other data storage structures






7. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






8. Methodical research of an incident with the purpose of finding the root cause






9. Potential danger to information or systems






10. Less granular organization of controls -






11. To smooth out reductions or increases in power






12. Subject based description of a system or a collection of resources






13. Specific format of technical and physical controls that support the chosen framework and the architecture






14. The level and label given to an individual for the purpose of compartmentalization






15. Guidelines within an organization that control the rules and configurations of an IDS






16. Intellectual property protection for marketing efforts






17. A mail server that improperly allows inbound SMTP connections for domains it does not serve.






18. Abstract and mathematical in nature - defining all possible states - transitions and operations






19. To know more than one job






20. OOP concept of an object at runtime






21. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






22. Unused storage capacity






23. Real-time data backup ( Data Mirroring)






24. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






25. Return to a normal state






26. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






27. Process of statistically testing a data set for the likelihood of relevant information.






28. Eavesdropping on network communications by a third party.






29. Program instructions based upon the CPU's specific architecture






30. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






31. A type of multitasking that allows for more even distribution of computing time among competing request






32. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






33. Statistical probabilities of a collision are more likely than one thinks






34. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






35. A collection of data or information that has a name






36. Communicate to stakeholders






37. The managerial approval to operate a system based upon knowledge of risk to operate






38. Deals with discretionary protection






39. Object based description of a system or a collection of resources






40. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






41. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






42. Real-time - automatic and transparent backup of data.






43. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






44. A system designed to prevent unauthorized access to or from a private network.






45. Responsibility of a user for the actions taken by their account which requires unique identification






46. Natural occurrence in circuits that are in close proximity






47. Mitigation of system or component loss or interruption through use of backup capability.






48. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






49. An encryption method that has a key as long as the message






50. An unintended communication path







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests