Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Review of data






2. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






3. Ertaining to a number system that has just two unique digits.






4. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






5. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






6. Regular operations are stopped and where processing is moved to the alternate site.






7. Line noise that is superimposed on the supply circuit.






8. A collection of information designed to reduce duplication and increase integrity






9. A process state - (blocked) needing input before continuing






10. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






11. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






12. Controls for termination of attempt to access object






13. Potential danger to information or systems






14. Calculation encompassing threats - vulnerabilities and assets






15. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






16. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






17. A design methodology which addresses risk early and often






18. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






19. To smooth out reductions or increases in power






20. The partial or full duplication of data from a source database to one or more destination databases.






21. A technology that reduces the size of a file.






22. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






23. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






24. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






25. A process state - to be executing a process on the CPU






26. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






27. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






28. The first rating that requires security labels






29. A type a computer memory that temporarily stores frequently used information for quick access.






30. A type of multitasking that allows for more even distribution of computing time among competing request






31. To jump to a conclusion






32. Use of specialized techniques for recovery - authentication - and analysis of electronic data






33. A risk assessment method - intrinsic value






34. Employment education done once per position or at significant change of function






35. A collection of data or information that has a name






36. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






38. Physical description on the exterior of an object that communicates the existence of a label






39. Total number of keys available that may be selected by the user of a cryptosystem






40. Part of a transaction control for a database which informs the database of the last recorded transaction






41. OOP concept of an object's abilities - what it does






42. Renders the file inaccessible to the operating system - available to reuse for data storage.






43. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






44. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






45. Record of system activity - which provides for monitoring and detection.






46. A subnetwork with storage devices servicing all servers on the attached network.






47. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






48. RADIUS - TACACS+ - Diameter






49. With enough computing power trying all possible combinations






50. Intellectual property management technique for identifying after distribution