Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using many alphabets






2. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






3. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






4. What is will remain - persistence






5. Responsibility for actions






6. A form of data hiding which protects running threads of execution from using each other's memory






7. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






8. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






9. OOP concept of a template that consist of attributes and behaviors






10. Joining two pieces of text






11. Reduction of voltage by the utility company for a prolonged period of time






12. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


13. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






14. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






15. Sphere of influence






16. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






17. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






18. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






19. Requirement of access to data for a clearly defined purpose






20. Act of scrambling the cleartext message by using a key.






21. Uncheck data input which results in redirection






22. Recovery alternative - short-term - high cost movable processing location






23. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






24. A unit of execution






25. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






26. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






27. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






28. A system that enforces an access control policy between two networks.






29. To assert or claim credentialing to an authentication system






30. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






31. Recovery alternative which includes cold site and some equipment and infrastructure is available






32. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






33. Interception of a communication session by an attacker.






34. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






35. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






36. A process state - to be either be unable to run waiting for an external event or terminated






37. Weak evidence






38. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






39. Using small special tools all tumblers of the lock are aligned - opening the door






40. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






41. Process whereby data is removed from active files and other data storage structures






42. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






43. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






44. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






45. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






46. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






47. A collection of information designed to reduce duplication and increase integrity






48. A process state - to be executing a process on the CPU






49. Object reuse protection and auditing






50. A running key using a random key that is never used again