Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device that provides the functions of both a bridge and a router.






2. A control before attack






3. Object based description of a single resource and the permission each subject






4. Small data warehouse






5. A system designed to prevent unauthorized access to or from a private network.






6. A backup type which creates a complete copy






7. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






8. A mail server that improperly allows inbound SMTP connections for domains it does not serve.






9. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






10. For PKI - decertify an entities certificate






11. Tool which mediates access






12. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






13. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






14. Scrambled form of the message or data






15. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






16. Just enough access to do the job






17. Record history of incident






18. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






19. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






20. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


21. Trading one for another






22. Descrambling the encrypted message with the corresponding key






23. The property that data meet with a priority expectation of quality and that the data can be relied upon.






24. Recording activities at the keyboard level






25. To know more than one job






26. The partial or full duplication of data from a source database to one or more destination databases.






27. Initial surge of current






28. An availability attack - to consume resources to the point of exhaustion






29. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






30. Recovery alternative - everything needed for the business function - except people and last backup






31. The one person responsible for data - its classification and control setting






32. OOP concept of a distinct copy of the class






33. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






34. Weakness or flaw in an asset






35. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






36. Prolonged loss of commercial power






37. Use of specialized techniques for recovery - authentication - and analysis of electronic data






38. System mediation of access with the focus on the context of the request






39. Owner directed mediation of access






40. Requirement of access to data for a clearly defined purpose






41. Reprogrammable basic startup instructions






42. A collection of information designed to reduce duplication and increase integrity






43. Recording the Who What When Where How of evidence






44. Key






45. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






46. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






47. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






48. Renders the record inaccessible to the database management system






49. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






50. Moving letters around