Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To move from location to location - keeping the same function






2. A software design technique for abstraction of a process






3. To reduce sudden rises in current






4. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






5. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






6. Written step-by-step actions






7. A group or network of honeypots






8. Record of system activity - which provides for monitoring and detection.






9. A type of multitasking that allows for more even distribution of computing time among competing request






10. Real-time data backup ( Data Mirroring)






11. Mediation of covert channels must be addressed






12. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.






13. Mediation of subject and object interactions






14. A legal enforceable agreement between: two people - two organizations - a person and an organization.






15. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






16. Scrambled form of the message or data






17. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.






18. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






19. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






20. Recording activities at the keyboard level






21. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






22. Malware that subverts the detective controls of an operating system






23. Recovery alternative - complete duplication of services including personnel






24. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






25. The guardian of asset(s) - a maintenance activity






26. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


27. Trading one for another






28. Periodic - automatic and transparent backup of data in bulk.






29. A design methodology which executes in a linear one way fashion






30. A signal suggesting a system has been or is being attacked.






31. A distributed system's transaction control that requires updates to complete or rollback






32. Uncheck data input which results in redirection






33. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






34. Hardware or software that is part of a larger system






35. Record history of incident






36. False memory reference






37. A layer 3 device that used to connect two or more network segments and regulate traffic.






38. Provides a physical cross connect point for devices.






39. A layer 2 device that used to connect two or more network segments and regulate traffic.






40. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






41. Encryption system using shared key/private key/single key/secret key






42. To load the first piece of software that starts a computer.






43. An alert or alarm that is triggered when no actual attack has taken place






44. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






45. The event signaling an IDS to produce an alarm when no attack has taken place






46. Long term knowledge building






47. Quantity of risk remaining after a control is applied






48. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






49. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






50. To jump to a conclusion







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests