Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Some systems are actually run at the alternate site






2. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






3. Location to perform the business function






4. Act of luring an intruder and is legal.






5. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






6. Physical description on the exterior of an object that communicates the existence of a label






7. The principles a person sets for themselves to follow






8. The core logic engine of an operating system which almost never changes






9. Tool which mediates access






10. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






11. Two certificate authorities that trust each other






12. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






13. More than one CPU on a single board






14. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.






15. An availability attack - to consume resources to the point of exhaustion






16. Ertaining to a number system that has just two unique digits.






17. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






18. False memory reference






19. The property that data meet with a priority expectation of quality and that the data can be relied upon.






20. System directed mediation of access with labels






21. Pertaining to law - no omissions






22. Written internalized or nationalized norms that are internal to an organization






23. Converts source code to an executable






24. Potentially compromising leakage of electrical or acoustical signals.






25. Pertaining to law - high degree of veracity






26. The core of a computer that calculates






27. People protect their domain






28. Is secondhand and usually not admissible in court






29. Long term knowledge building






30. Narrow scope examination of a system






31. To load the first piece of software that starts a computer.






32. Business and technical process of applying security software updates in a regulated periodic way






33. An asymmetric cryptography mechanism that provides authentication.






34. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. A one way - directed graph which indicates confidentiality or integrity flow






36. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






37. System mediation of access with the focus on the context of the request






38. Process whereby data is removed from active files and other data storage structures






39. Joining two pieces of text






40. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






41. Mediation of subject and object interactions






42. Use of specialized techniques for recovery - authentication - and analysis of electronic data






43. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






44. Momentary loss of power






45. To stop damage from spreading






46. Guidelines within an organization that control the rules and configurations of an IDS






47. Object based description of a single resource and the permission each subject






48. OOP concept of a taking attributes from the original or parent






49. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






50. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate