Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. What is will remain - persistence






3. Owner directed mediation of access






4. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






5. Unchecked data which spills into another location in memory






6. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.






7. Natural occurrence in circuits that are in close proximity






8. A layer 2 device that used to connect two or more network segments and regulate traffic.






9. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






10. A copy of transaction data - designed for querying and reporting






11. Summary of a communication for the purpose of integrity






12. Trading one for another






13. Record of system activity - which provides for monitoring and detection.






14. Actions measured against either a policy or what a reasonable person would do






15. An image compression standard for photographs






16. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






17. Two certificate authorities that trust each other






18. Provides a physical cross connect point for devices.






19. A temporary public file to inform others of a compromised digital certificate






20. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






21. OOP concept of an object at runtime






22. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






23. Weakness or flaw in an asset






24. Program that inappropriately collects private data or activity






25. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






26. A mathematical tool for verifying no unintentional changes have been made






27. Code breaking - practice of defeating the protective properties of cryptography.






28. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






29. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






30. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






31. People protect their domain






32. OOP concept of an object's abilities - what it does






33. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






34. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






35. Abstract and mathematical in nature - defining all possible states - transitions and operations






36. Used to code/decode a digital data stream.






37. A Denial of Service attack that floods the target system with connection requests that are not finalized.






38. A computer designed for the purpose of studying adversaries






39. Memory management technique which allows data to be moved from one memory address to another






40. More than one processor sharing same memory - also know as parallel systems






41. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






42. Indivisible - data field must contain only one value that either all transactions take place or none do






43. Methodical research of an incident with the purpose of finding the root cause






44. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






45. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






46. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






47. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






48. Encryption system using shared key/private key/single key/secret key






49. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






50. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)