Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






2. To start business continuity processes






3. A design methodology which executes in a linear one way fashion






4. Written step-by-step actions






5. High level - pertaining to planning






6. Effort/time needed to overcome a protective measure






7. A documented battle plan for coordinating response to incidents.






8. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






9. A system designed to prevent unauthorized access to or from a private network.






10. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






11. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






12. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






13. The technical and risk assesment of a system within the context of the operating environment






14. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






15. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


16. Hitting a filed down key in a lock with a hammer to open without real key






17. Memory management technique which allows subjects to use the same resource






18. Data or interference that can trigger a false positive






19. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






20. Uncleared buffers or media






21. To stop damage from spreading






22. Written suggestions that direct choice to a few alternatives






23. A program with an inappropriate second purpose






24. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






25. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






26. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






27. Memory - RAM






28. A back up type - where the organization has excess capacity in another location.






29. Natural or human-readable form of message






30. Ertaining to a number system that has just two unique digits.






31. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






32. Memory management technique which allows data to be moved from one memory address to another






33. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






34. Power surge






35. One way encryption






36. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






37. Actions measured against either a policy or what a reasonable person would do






38. An event which stops business from continuing.






39. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






40. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






41. A risk assessment method - intrinsic value






42. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






43. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






44. False memory reference






45. Highest level of authority at EOC with knowledge of the business process and the resources available






46. System directed mediation of access with labels






47. Property that data is represented in the same manner at all times






48. Creation distribution update and deletion






49. Recording the Who What When Where How of evidence






50. Consume resources to a point of exhaustion - loss of availability