Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. More than one CPU on a single board






2. Moving letters around






3. Natural occurrence in circuits that are in close proximity






4. A computer designed for the purpose of studying adversaries






5. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






6. A programming design concept which abstracts one set of functions from another in a serialized fashion






7. Recovery alternative - a building only with sufficient power - and HVAC






8. Pertaining to law - lending it self to one side of an argument






9. Vehicle or tool that exploits a weakness






10. Induces a crime - tricks a person - and is illegal






11. Outputs within a given function are the same result






12. Mediation of subject and object interactions






13. One entity with two competing allegiances






14. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






15. Statistical probabilities of a collision are more likely than one thinks






16. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






17. Uncleared buffers or media






18. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






19. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






20. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






21. Short period of low voltage.






22. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






23. Recovery alternative which includes cold site and some equipment and infrastructure is available






24. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






25. A condition in which neither party is willing to stop their activity for the other to complete






26. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






27. Pertaining to law - accepted by a court






28. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






29. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






30. A system that enforces an access control policy between two networks.






31. A documented battle plan for coordinating response to incidents.






32. A state where two subjects can access the same object without proper mediation






33. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. A state for operating system tasks only






35. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






36. Someone who want to know how something works - typically by taking it apart






37. Uncheck data input which results in redirection






38. Encryption system using shared key/private key/single key/secret key






39. Unsolicited commercial email






40. Moving the alphabet intact a certain number spaces






41. Line noise that is superimposed on the supply circuit.






42. Fault tolerance for power






43. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






44. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






45. To smooth out reductions or increases in power






46. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






47. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






48. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






49. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






50. Recovery alternative which outsources a business function at a cost