Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uncheck data input which results in redirection






2. Control category- to give instructions or inform






3. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






4. Specific format of technical and physical controls that support the chosen framework and the architecture






5. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






6. Mitigate damage by isolating compromised systems from the network.






7. A group or network of honeypots






8. Hiding the fact that communication has occurred






9. People who interact with assets






10. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






11. Program that inappropriately collects private data or activity






12. The property that data meet with a priority expectation of quality and that the data can be relied upon.






13. False memory reference






14. Act of luring an intruder and is legal.






15. Intellectual property protection for an confidential and critical process






16. To evaluate the current situation and make basic decisions as to what to do






17. Try a list of words in passwords or encryption keys






18. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






19. A database backup type which records at the transaction level






20. Real-time data backup ( Data Mirroring)






21. Act of scrambling the cleartext message by using a key.






22. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






23. An event which stops business from continuing.






24. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






25. Granular decision by a system of permitting or denying access to a particular resource on the system






26. Return to a normal state






27. Representatives from each functional area or department get together and walk through the plan from beginning to end.






28. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Some systems are actually run at the alternate site






30. The collection and summation of risk data relating to a particular asset and controls for that asset






31. Unused storage capacity






32. A record that must be preserved and available for retrieval if needed.






33. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






34. A layer 2 device that used to connect two or more network segments and regulate traffic.






35. Converts source code to an executable






36. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






37. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy






38. Can be statistical (monitor behavior) or signature based (watch for known attacks)






39. Object based description of a system or a collection of resources






40. Short period of low voltage.






41. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






42. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






43. Line by line translation from a high level language to machine code






44. Momentary loss of power






45. Subjects will not interact with each other's objects






46. Memory management technique that allows two processes to run concurrently without interaction






47. Control type- that is communication based - typically written or oral






48. The core of a computer that calculates






49. Renders the file inaccessible to the operating system - available to reuse for data storage.






50. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.