Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






2. To collect many small pieces of data






3. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






4. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






5. Mathematical function that determines the cryptographic operations






6. Outputs within a given function are the same result






7. Most granular organization of controls






8. Planning with a goal of returning to the normal business function






9. Used to code/decode a digital data stream.






10. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






11. May be responsible for overall recovery of an organization or unit(s).






12. Responsibility of a user for the actions taken by their account which requires unique identification






13. Consume resources to a point of exhaustion - loss of availability






14. Malware that subverts the detective controls of an operating system






15. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






16. Transaction controls for a database - a return to a previous state






17. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






18. Written step-by-step actions






19. To assert or claim credentialing to an authentication system






20. Wrong against society






21. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






22. A collection of information designed to reduce duplication and increase integrity






23. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.






24. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






25. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. To move from location to location - keeping the same function






27. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






28. A one way - directed graph which indicates confidentiality or integrity flow






29. Substitution at the word or phrase level






30. A risk assessment method - measurable real money cost






31. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






32. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






33. Memory management technique which allows data to be moved from one memory address to another






34. A device that provides the functions of both a bridge and a router.






35. Intermediate level - pertaining to planning






36. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






37. Vehicle or tool that exploits a weakness






38. A condition in which neither party is willing to stop their activity for the other to complete






39. Act of luring an intruder and is legal.






40. A type a computer memory that temporarily stores frequently used information for quick access.






41. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






42. All of the protection mechanism in a computer system






43. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


44. A shield against leakage of electromagnetic signals.






45. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






46. A record that must be preserved and available for retrieval if needed.






47. System mediation of access with the focus on the context of the request






48. A distributed system's transaction control that requires updates to complete or rollback






49. Abstract and mathematical in nature - defining all possible states - transitions and operations






50. Key