Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A database backup type which records at the transaction level






2. To break a business process into separate functions and assign to different people






3. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






4. A programming design concept which abstracts one set of functions from another in a serialized fashion






5. For PKI - to have more than one person in charge of a sensitive function






6. To set the clearance of a subject or the classification of an object






7. A program that waits for a condition or time to occur that executes an inappropriate activity






8. Renders the file inaccessible to the operating system - available to reuse for data storage.






9. The core logic engine of an operating system which almost never changes






10. Object based description of a single resource and the permission each subject






11. Statistical probabilities of a collision are more likely than one thinks






12. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






13. A passive network attack involving monitoring of traffic.






14. Recovery alternative - short-term - high cost movable processing location






15. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






16. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






17. Used to code/decode a digital data stream.






18. More than one processor sharing same memory - also know as parallel systems






19. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






20. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






21. Location where coordination and execution of BCP or DRP is directed






22. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






23. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






24. Evaluation of a system without prior knowledge by the tester






25. To evaluate the current situation and make basic decisions as to what to do






26. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






27. Code breaking - practice of defeating the protective properties of cryptography.






28. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






29. One of the key benefits of a network is the ability to share files stored on the server among several users.






30. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






31. An encryption method that has a key as long as the message






32. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






33. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






34. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. Final purpose or result






36. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






37. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






38. Impossibility of denying authenticity and identity






39. A collection of information designed to reduce duplication and increase integrity






40. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






41. One entity with two competing allegiances






42. Unauthorized access of network devices.






43. With enough computing power trying all possible combinations






44. More than one CPU on a single board






45. An alert or alarm that is triggered when no actual attack has taken place






46. Quantity of risk remaining after a control is applied






47. Creation distribution update and deletion






48. Intellectual property protection for an invention






49. Communicate to stakeholders






50. Objects or programming that looks the different but act same