Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A documented battle plan for coordinating response to incidents.






2. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






3. Controls for termination of attempt to access object






4. A condition in which neither party is willing to stop their activity for the other to complete






5. A running key using a random key that is never used again






6. Information about data or records






7. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






8. People who interact with assets






9. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






10. A layer 2 device that used to connect two network segments and regulate traffic.






11. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






12. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






13. Object based description of a system or a collection of resources






14. Identification and notification of an unauthorized and/or undesired action






15. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






16. To move from location to location - keeping the same function






17. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






18. The core logic engine of an operating system which almost never changes






19. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






20. A world-wide wireless technology






21. Written core statements that rarely change






22. Pertaining to law - lending it self to one side of an argument






23. A type of attack involving attempted insertion - deletion or altering of data.






24. An alert or alarm that is triggered when no actual attack has taken place






25. A disturbance that degrades performance of electronic devices and electronic communications.






26. Threats x Vulnerability x Asset Value = Total Risk






27. One entity with two competing allegiances






28. A template for the designing the architecture






29. Security policy - procedures - and compliance enforcement






30. Maintenance procedures outline the process for the review and update of business continuity plans.






31. A control after attack






32. Converts source code to an executable






33. Control category - more than one control on a single asset






34. Sphere of influence






35. Power surge






36. All of the protection mechanism in a computer system






37. Someone who wants to cause harm






38. More than one processor sharing same memory - also know as parallel systems






39. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






40. A process state - to be executing a process on the CPU






41. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






42. Pertaining to law - verified as real






43. Reduction of voltage by the utility company for a prolonged period of time






44. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






45. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






46. Evaluation of a system without prior knowledge by the tester






47. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






48. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






49. Data or interference that can trigger a false positive






50. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183