Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






2. A physical enclosure for verifying identity before entry to a facility






3. To evaluate the current situation and make basic decisions as to what to do






4. Event(s) that cause harm






5. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






6. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






7. Controls for logging and alerting






8. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






9. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






10. A choice in risk management - to convince another to assume risk - typically by payment






11. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






12. To create a copy of data as a precaution against the loss or damage of the original data.






13. Another subject cannot see an ongoing or pending update until it is complete






14. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






15. Responsibility of a user for the actions taken by their account which requires unique identification






16. An unintended communication path






17. Recording activities at the keyboard level






18. More than one processor sharing same memory - also know as parallel systems






19. Converts source code to an executable






20. System directed mediation of access with labels






21. Weak evidence






22. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






23. Of a system without prior knowledge by the tester or the tested






24. Uncleared buffers or media






25. Control category- to discourage an adversary from attempting to access






26. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






27. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






28. Wrong against society






29. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






30. Try a list of words in passwords or encryption keys






31. Encryption system using shared key/private key/single key/secret key






32. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






33. Controls for termination of attempt to access object






34. A programming design concept which abstracts one set of functions from another in a serialized fashion






35. A record that must be preserved and available for retrieval if needed.






36. A layer 3 device that used to connect two or more network segments and regulate traffic.






37. Just enough access to do the job






38. Potential danger to information or systems






39. Methodical research of an incident with the purpose of finding the root cause






40. Final purpose or result






41. The level and label given to an individual for the purpose of compartmentalization






42. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


43. Interception of a communication session by an attacker.






44. A programming device use in development to circumvent controls






45. Total number of keys available that may be selected by the user of a cryptosystem






46. Something that happened






47. OOP concept of an object's abilities - what it does






48. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






49. A program that waits for a condition or time to occur that executes an inappropriate activity






50. Information about a particular data set