Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. False memory reference






2. Something that happened






3. The collection and summation of risk data relating to a particular asset and controls for that asset






4. Memory management technique that allows two processes to run concurrently without interaction






5. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






6. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






7. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






8. Key






9. Pertaining to law - no omissions






10. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






11. OOP concept of a distinct copy of the class






12. To collect many small pieces of data






13. Reduces causes of fire






14. Memory management technique which allows data to be moved from one memory address to another






15. Amount of time for restoring a business process or function to normal operations without major loss






16. A temporary public file to inform others of a compromised digital certificate






17. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






18. Intellectual property protection for the expression of an idea






19. A subnetwork with storage devices servicing all servers on the attached network.






20. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






21. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






23. A signal suggesting a system has been or is being attacked.






24. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






25. The level and label given to an individual for the purpose of compartmentalization






26. A layer 3 device that used to connect two or more network segments and regulate traffic.






27. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






28. Using small special tools all tumblers of the lock are aligned - opening the door






29. Record history of incident






30. Binary decision by a system of permitting or denying access to the entire system






31. A world-wide wireless technology






32. A description of a database






33. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






34. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






35. To execute more than one instruction at an instant in time






36. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






37. Define the way in which the organization operates.






38. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






39. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






40. Policy or stated actions






41. An availability attack - to consume resources to the point of exhaustion






42. A basic level of network access control that is based upon information contained in the IP packet header.






43. Program instructions based upon the CPU's specific architecture






44. A secure connection to another network.






45. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






46. Inappropriate data






47. To assert or claim credentialing to an authentication system






48. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






49. A protocol for the efficient transmission of voice over the Internet






50. Substitution at the word or phrase level