Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






2. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






3. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


4. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






5. Written core statements that rarely change






6. A race condition where the security changes during the object's access






7. Low level - pertaining to planning






8. The collection and summation of risk data relating to a particular asset and controls for that asset






9. A unit of execution






10. To reduce fire






11. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






12. Independent malware that requires user interaction to execute






13. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






14. A secure connection to another network.






15. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






16. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






17. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






18. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






19. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






20. Subject based description of a system or a collection of resources






21. Location to perform the business function






22. Quantity of risk remaining after a control is applied






23. Eavesdropping on network communications by a third party.






24. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






25. System of law based upon precedence - with major divisions of criminal - tort - and administrative






26. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






27. A electronic attestation of identity by a certificate authority






28. Code breaking - practice of defeating the protective properties of cryptography.






29. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






30. Statistical probabilities of a collision are more likely than one thinks






31. The core of a computer that calculates






32. Renders the file inaccessible to the operating system - available to reuse for data storage.






33. Intellectual property protection for an confidential and critical process






34. Disruption of operation of an electronic device due to a competing electromagnetic field.






35. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






36. Specific format of technical and physical controls that support the chosen framework and the architecture






37. Real-time data backup ( Data Mirroring)






38. Final purpose or result






39. An image compression standard for photographs






40. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






41. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






42. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






43. All of the protection mechanism in a computer system






44. Controls for logging and alerting






45. To reduce sudden rises in current






46. Act of luring an intruder and is legal.






47. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






48. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






49. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






50. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests