Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OOP concept of a taking attributes from the original or parent






2. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






3. A planned or unplanned interruption in system availability.






4. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






5. A electronic attestation of identity by a certificate authority






6. A mathematical tool for verifying no unintentional changes have been made






7. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






8. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






9. A trusted issuer of digital certificates






10. Trading one for another






11. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






12. Converts a high level language into machine language






13. Mediation of subject and object interactions






14. System directed mediation of access with labels






15. Mathematical function that determines the cryptographic operations






16. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






17. To reduce sudden rises in current






18. A risk assessment method - intrinsic value






19. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






20. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






21. Memory management technique which allows subjects to use the same resource






22. Control category- to restore to a previous state by removing the adversary and or the results of their actions






23. Intellectual property protection for an confidential and critical process






24. Two certificate authorities that trust each other






25. Location to perform the business function






26. Unsolicited commercial email






27. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


28. A condition in which neither party is willing to stop their activity for the other to complete






29. Organized group of compromised computers






30. A type of multitasking that allows for more even distribution of computing time among competing request






31. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






32. Business and technical process of applying security software updates in a regulated periodic way






33. Subject based description of a system or a collection of resources






34. A backup type - for databases at a point in time






35. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






36. OOP concept of a template that consist of attributes and behaviors






37. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






38. Process of statistically testing a data set for the likelihood of relevant information.






39. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






40. An availability attack - to consume resources to the point of exhaustion






41. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






42. A layer 3 device that used to connect two or more network segments and regulate traffic.






43. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






44. A state where two subjects can access the same object without proper mediation






45. A test conducted on one or more components of a plan under actual operating conditions.






46. Hitting a filed down key in a lock with a hammer to open without real key






47. To create a copy of data as a precaution against the loss or damage of the original data.






48. Vehicle or tool that exploits a weakness






49. People who interact with assets






50. Final purpose or result