Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who wants to cause harm






2. A process state - (blocked) needing input before continuing






3. Control category- to give instructions or inform






4. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


5. Forging of an IP address.






6. A basic level of network access control that is based upon information contained in the IP packet header.






7. Property that data is represented in the same manner at all times






8. Security policy - procedures - and compliance enforcement






9. A programming device use in development to circumvent controls






10. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






11. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






12. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy






13. Controls for termination of attempt to access object






14. The hard drive






15. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






16. Ertaining to a number system that has just two unique digits.






17. Prolonged loss of commercial power






18. Just enough access to do the job






19. Renders the record inaccessible to the database management system






20. Mediation of covert channels must be addressed






21. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






22. Pertaining to law - high degree of veracity






23. All of the protection mechanism in a computer system






24. High level - pertaining to planning






25. Written step-by-step actions






26. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






27. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






28. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






29. A physical enclosure for verifying identity before entry to a facility






30. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






31. Consume resources to a point of exhaustion - loss of availability






32. For PKI - to store another copy of a key






33. High frequency noise






34. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






35. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






36. OOP concept of a taking attributes from the original or parent






37. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






38. Code breaking - practice of defeating the protective properties of cryptography.






39. People protect their domain






40. For PKI - to have more than one person in charge of a sensitive function






41. Unauthorized wireless network access device.






42. Responsibility for actions






43. Deals with discretionary protection






44. Disruption of operation of an electronic device due to a competing electromagnetic field.






45. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






46. To set the clearance of a subject or the classification of an object






47. Owner directed mediation of access






48. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






49. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






50. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.