Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recording the Who What When Where How of evidence






2. Eavesdropping on network communications by a third party.






3. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






4. One of the key benefits of a network is the ability to share files stored on the server among several users.






5. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






6. A disturbance that degrades performance of electronic devices and electronic communications.






7. The core logic engine of an operating system which almost never changes






8. Substitution at the word or phrase level






9. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






10. Fault tolerance for power






11. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






12. Claiming another's identity at a physical level






13. Weak evidence






14. Reprogrammable basic startup instructions






15. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


16. A documented battle plan for coordinating response to incidents.






17. To stop damage from spreading






18. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






19. A covert storage channel on the file attribute






20. Recovery alternative - complete duplication of services including personnel






21. Act of luring an intruder and is legal.






22. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






23. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






24. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


25. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






26. Event(s) that cause harm






27. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






28. The hard drive






29. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






30. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






31. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






32. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






33. Renders the file inaccessible to the operating system - available to reuse for data storage.






34. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






35. Control type- that is communication based - typically written or oral






36. Owner directed mediation of access






37. Narrow scope examination of a system






38. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






39. Wrong against society






40. Intellectual property protection for an confidential and critical process






41. Power surge






42. Initial surge of current






43. An availability attack - to consume resources to the point of exhaustion






44. A physical enclosure for verifying identity before entry to a facility






45. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






46. Data or interference that can trigger a false positive






47. To load the first piece of software that starts a computer.






48. Objects or programming that looks the different but act same






49. Control category - more than one control on a single asset






50. Low level - pertaining to planning







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests