Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






2. Record of system activity - which provides for monitoring and detection.






3. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






4. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






5. Pertaining to law - no omissions






6. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






7. Malware that makes small random changes to many data points






8. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






9. A Denial of Service attack that floods the target system with connection requests that are not finalized.






10. Mediation of covert channels must be addressed






11. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






12. To smooth out reductions or increases in power






13. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






14. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






15. Something that happened






16. Amount of time for restoring a business process or function to normal operations without major loss






17. Dedicated fast memory located on the same board as the CPU






18. To jump to a conclusion






19. Real-time data backup ( Data Mirroring)






20. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






21. The property that data meet with a priority expectation of quality and that the data can be relied upon.






22. Final purpose or result






23. Independent malware that requires user interaction to execute






24. What is will remain - persistence






25. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






26. Data or interference that can trigger a false positive






27. State of computer - to be running a process






28. A shield against leakage of electromagnetic signals.






29. More than one process in the middle of executing at a time






30. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






31. Potential danger to information or systems






32. Planning with a goal of returning to the normal business function






33. Creation distribution update and deletion






34. The guardian of asset(s) - a maintenance activity






35. Periodic - automatic and transparent backup of data in bulk.






36. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






37. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






38. A planned or unplanned interruption in system availability.






39. Low level - pertaining to planning






40. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


41. Forging of an IP address.






42. Can be statistical (monitor behavior) or signature based (watch for known attacks)






43. System directed mediation of access with labels






44. Pertaining to law - accepted by a court






45. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






46. To reduce fire






47. High frequency noise






48. Reprogrammable basic startup instructions






49. Outputs within a given function are the same result






50. Return to a normal state