Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Power surge






2. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






3. Initial surge of current






4. Recovery alternative which includes cold site and some equipment and infrastructure is available






5. Firewalls - encryption - and access control lists






6. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






7. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






8. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






9. The first rating that requires security labels






10. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






11. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






12. Objects or programming that looks the different but act same






13. Part of a transaction control for a database which informs the database of the last recorded transaction






14. A distributed system's transaction control that requires updates to complete or rollback






15. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






16. Memory - RAM






17. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






18. High level - pertaining to planning






19. Intellectual property protection for an invention






20. Organized group of compromised computers






21. Potential danger to information or systems






22. A disturbance that degrades performance of electronic devices and electronic communications.






23. Malware that makes many small changes over time to a single data point or system






24. A subnetwork with storage devices servicing all servers on the attached network.






25. A Trojan horse with the express underlying purpose of controlling host from a distance






26. Substitution at the word or phrase level






27. Momentary loss of power






28. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






29. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






30. A software design technique for abstraction of a process






31. Deals with discretionary protection






32. A condition in which neither party is willing to stop their activity for the other to complete






33. Pertaining to law - lending it self to one side of an argument






34. Pertaining to law - verified as real






35. Line noise that is superimposed on the supply circuit.






36. Prolonged loss of commercial power






37. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






38. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






39. One entity with two competing allegiances






40. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






41. Individuals and departments responsible for the storage and safeguarding of computerized data.






42. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






43. Descrambling the encrypted message with the corresponding key






44. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






45. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






46. More than one process in the middle of executing at a time






47. A collection of information designed to reduce duplication and increase integrity






48. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


49. A collection of data or information that has a name






50. Intellectual property protection for an confidential and critical process






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests