Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Power surge






2. Unauthorized access of network devices.






3. Recovery alternative - short-term - high cost movable processing location






4. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






5. Responsibility for actions






6. A collection of information designed to reduce duplication and increase integrity






7. A planned or unplanned interruption in system availability.






8. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






9. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






10. Long term knowledge building






11. Reduces causes of fire






12. One way encryption






13. Uncheck data input which results in redirection






14. Scrambled form of the message or data






15. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






16. Evidence must be: admissible - authentic - complete - accurate - and convincing






17. Subjects will not interact with each other's objects






18. To assert or claim credentialing to an authentication system






19. A secure connection to another network.






20. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






21. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






22. Requirement to take time off






23. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






24. Maximum tolerance for loss of certain business function - basis of strategy






25. A device that sequentially switches multiple analog inputs to the output.






26. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


27. Program that inappropriately collects private data or activity






28. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






29. Unsolicited commercial email






30. Written core statements that rarely change






31. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






32. Moving the alphabet intact a certain number spaces






33. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






34. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






35. Forgery of the sender's email address in an email header.






36. Recovery alternative - everything needed for the business function - except people and last backup






37. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






38. A trusted issuer of digital certificates






39. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






40. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






41. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






42. Information about data or records






43. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






44. The property that data meet with a priority expectation of quality and that the data can be relied upon.






45. A system designed to prevent unauthorized access to or from a private network.






46. Real-time - automatic and transparent backup of data.






47. Process of statistically testing a data set for the likelihood of relevant information.






48. To execute more than one instruction at an instant in time






49. Mathematical function that determines the cryptographic operations






50. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.