Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A passive network attack involving monitoring of traffic.






2. An encryption method that has a key as long as the message






3. The core logic engine of an operating system which almost never changes






4. RADIUS - TACACS+ - Diameter






5. Code making






6. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






7. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






8. Object reuse protection and auditing






9. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






10. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






11. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






12. May be responsible for overall recovery of an organization or unit(s).






13. A group or network of honeypots






14. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






15. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






16. Potentially compromising leakage of electrical or acoustical signals.






17. A condition in which neither party is willing to stop their activity for the other to complete






18. Mitigate damage by isolating compromised systems from the network.






19. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






21. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






22. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






23. Recovery alternative - short-term - high cost movable processing location






24. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






25. Another subject cannot see an ongoing or pending update until it is complete






26. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






27. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






28. All of the protection mechanism in a computer system






29. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






30. A physical enclosure for verifying identity before entry to a facility






31. Location where coordination and execution of BCP or DRP is directed






32. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






33. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






34. Deals with discretionary protection






35. OOP concept of a class's details to be hidden from object






36. Memory - RAM






37. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






38. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






39. An asymmetric cryptography mechanism that provides authentication.






40. One way encryption






41. Wrong against society






42. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


43. A device that converts between digital and analog representation of data.






44. Return to a normal state






45. Line noise that is superimposed on the supply circuit.






46. Regular operations are stopped and where processing is moved to the alternate site.






47. Mediation of covert channels must be addressed






48. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






49. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






50. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions