Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RADIUS - TACACS+ - Diameter






2. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






3. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






4. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






5. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






6. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






7. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






8. Mediation of covert channels must be addressed






9. Control category - more than one control on a single asset






10. A legal enforceable agreement between: two people - two organizations - a person and an organization.






11. Used to code/decode a digital data stream.






12. A running key using a random key that is never used again






13. Recovery alternative - short-term - high cost movable processing location






14. Claiming another's identity at a physical level






15. Pertaining to law - lending it self to one side of an argument






16. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


17. System of law based upon precedence - with major divisions of criminal - tort - and administrative






18. People who interact with assets






19. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






20. Owner directed mediation of access






21. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






22. Fault tolerance for power






23. Specific format of technical and physical controls that support the chosen framework and the architecture






24. Act of scrambling the cleartext message by using a key.






25. Program that inappropriately collects private data or activity






26. A process state - to be either be unable to run waiting for an external event or terminated






27. Some systems are actually run at the alternate site






28. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






29. A collection of information designed to reduce duplication and increase integrity






30. The core of a computer that calculates






31. Data or interference that can trigger a false positive






32. An administrative unit or a group of objects and subjects controlled by one reference monitor






33. Joining two pieces of text






34. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






35. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






36. Policy or stated actions






37. The partial or full duplication of data from a source database to one or more destination databases.






38. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






39. OOP concept of a distinct copy of the class






40. Responsibility for actions






41. Hardware or software that is part of a larger system






42. Ertaining to a number system that has just two unique digits.






43. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






44. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






45. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






46. A layer 3 device that used to connect two or more network segments and regulate traffic.






47. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






48. May be responsible for overall recovery of an organization or unit(s).






49. Momentary loss of power






50. Encryption system using a pair of mathematically related unequal keys