Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






2. A planned or unplanned interruption in system availability.






3. Written step-by-step actions






4. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






5. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


6. A backup type - for databases at a point in time






7. A running key using a random key that is never used again






8. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






9. A covert storage channel on the file attribute






10. Natural occurrence in circuits that are in close proximity






11. Small data files written to a user's hard drive by a web server.






12. A one way - directed graph which indicates confidentiality or integrity flow






13. Control category- to discourage an adversary from attempting to access






14. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






15. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






16. Someone who wants to cause harm






17. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






18. A layer 2 device that used to connect two network segments and regulate traffic.






19. Intellectual property protection for marketing efforts






20. Ertaining to a number system that has just two unique digits.






21. The hard drive






22. A copy of transaction data - designed for querying and reporting






23. Vehicle stopping object






24. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






25. Just enough access to do the job






26. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






27. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






28. To assert or claim credentialing to an authentication system






29. To execute more than one instruction at an instant in time






30. A unit of execution






31. Act of luring an intruder and is legal.






32. Moving the alphabet intact a certain number spaces






33. Pertaining to law - verified as real






34. An encryption method that has a key as long as the message






35. Power surge






36. Periodic - automatic and transparent backup of data in bulk.






37. A trusted issuer of digital certificates






38. Malware that makes many small changes over time to a single data point or system






39. The first rating that requires security labels






40. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






41. A race condition where the security changes during the object's access






42. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






43. Creation distribution update and deletion






44. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






45. The chance that something negative will occur






46. Quantity of risk remaining after a control is applied






47. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






48. Hardware or software that is part of a larger system






49. The core logic engine of an operating system which almost never changes






50. A type a computer memory that temporarily stores frequently used information for quick access.