Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






2. DoS - Spoofing - dictionary - brute force - wardialing






3. One of the key benefits of a network is the ability to share files stored on the server among several users.






4. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






5. Highest level of authority at EOC with knowledge of the business process and the resources available






6. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






7. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






8. Firewalls - encryption - and access control lists






9. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






10. Potentially retrievable data residue that remains following intended erasure of data.






11. Low level - pertaining to planning






12. Written step-by-step actions






13. A record that must be preserved and available for retrieval if needed.






14. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






15. Responsibility of a user for the actions taken by their account which requires unique identification






16. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






17. A state for operating system tasks only






18. One way encryption






19. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






20. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






21. The partial or full duplication of data from a source database to one or more destination databases.






22. Define the way in which the organization operates.






23. Recovery alternative which outsources a business function at a cost






24. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






25. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






26. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






27. To smooth out reductions or increases in power






28. Evidence must be: admissible - authentic - complete - accurate - and convincing






29. Mitigate damage by isolating compromised systems from the network.






30. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


31. Control category - more than one control on a single asset






32. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






33. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






34. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






35. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






36. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






37. Record history of incident






38. A temporary public file to inform others of a compromised digital certificate






39. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






40. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






41. Requirement to take time off






42. Pertaining to law - lending it self to one side of an argument






43. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






44. Granular decision by a system of permitting or denying access to a particular resource on the system






45. Mediation of covert channels must be addressed






46. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






47. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






48. A program with an inappropriate second purpose






49. The technical and risk assesment of a system within the context of the operating environment






50. A copy of transaction data - designed for querying and reporting