Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A world-wide wireless technology






2. Line noise that is superimposed on the supply circuit.






3. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






4. Specific format of technical and physical controls that support the chosen framework and the architecture






5. A signal suggesting a system has been or is being attacked.






6. Recovery alternative - everything needed for the business function - except people and last backup






7. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






8. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






9. A risk assessment method - measurable real money cost






10. System of law based upon what is good for society






11. The guardian of asset(s) - a maintenance activity






12. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






13. Forging of an IP address.






14. Regular operations are stopped and where processing is moved to the alternate site.






15. Reduces causes of fire






16. Momentary loss of power






17. A device that sequentially switches multiple analog inputs to the output.






18. Of a system without prior knowledge by the tester or the tested






19. RADIUS - TACACS+ - Diameter






20. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






21. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






22. Intellectual property protection for the expression of an idea






23. Planning for the delegation of authority required when decisions must be made without the normal chain of command






24. A Trojan horse with the express underlying purpose of controlling host from a distance






25. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






26. Hiding the fact that communication has occurred






27. An availability attack - to consume resources to the point of exhaustion






28. The chance that something negative will occur






29. The partial or full duplication of data from a source database to one or more destination databases.






30. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






31. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






32. Define the way in which the organization operates.






33. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






34. Actions measured against either a policy or what a reasonable person would do






35. A record that must be preserved and available for retrieval if needed.






36. Policy or stated actions






37. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






38. Intermediate level - pertaining to planning






39. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






40. Someone who wants to cause harm






41. More than one CPU on a single board






42. A backup of data located where staff can gain access immediately






43. Representatives from each functional area or department get together and walk through the plan from beginning to end.






44. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






45. Dedicated fast memory located on the same board as the CPU






46. A telephone exchange for a specific office or business.






47. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






48. Most granular organization of controls






49. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


50. Moving the alphabet intact a certain number spaces