Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Key






2. Intellectual property protection for an confidential and critical process






3. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






4. Methodical research of an incident with the purpose of finding the root cause






5. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






6. A risk assessment method - intrinsic value






7. Sudden rise in voltage in the power supply.






8. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






9. Program that inappropriately collects private data or activity






10. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






11. Actions measured against either a policy or what a reasonable person would do






12. Moving the alphabet intact a certain number spaces






13. One entity with two competing allegiances






14. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






15. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.






16. Prolonged loss of commercial power






17. Narrow scope examination of a system






18. Natural or human-readable form of message






19. A type a computer memory that temporarily stores frequently used information for quick access.






20. Trading one for another






21. System of law based upon precedence - with major divisions of criminal - tort - and administrative






22. Planning with a goal of returning to the normal business function






23. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


24. To break a business process into separate functions and assign to different people






25. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






26. People who interact with assets






27. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






28. A state where two subjects can access the same object without proper mediation






29. Impossibility of denying authenticity and identity






30. Most granular organization of controls






31. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






32. Something that happened






33. Hitting a filed down key in a lock with a hammer to open without real key






34. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






35. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






36. Maintenance procedures outline the process for the review and update of business continuity plans.






37. A risk assessment method - measurable real money cost






38. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






39. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






40. Written suggestions that direct choice to a few alternatives






41. Act of luring an intruder and is legal.






42. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






43. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware






44. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






45. Granular decision by a system of permitting or denying access to a particular resource on the system






46. A secure connection to another network.






47. OOP concept of an object at runtime






48. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






49. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






50. Induces a crime - tricks a person - and is illegal