Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






2. Some systems are actually run at the alternate site






3. To create a copy of data as a precaution against the loss or damage of the original data.






4. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






5. Memory management technique which allows data to be moved from one memory address to another






6. Employment education done once per position or at significant change of function






7. The principles a person sets for themselves to follow






8. Object based description of a single resource and the permission each subject






9. A mobilized resource purchased or contracted for the purpose of business recovery.






10. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






11. Recovery alternative which outsources a business function at a cost






12. Vehicle stopping object






13. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






14. A mathematical tool for verifying no unintentional changes have been made






15. Control type- that is communication based - typically written or oral






16. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






17. Pertaining to law - lending it self to one side of an argument






18. Objects or programming that looks the different but act same






19. Moving the alphabet intact a certain number spaces






20. High degree of visual control






21. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






22. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






23. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware






24. A condition in which neither party is willing to stop their activity for the other to complete






25. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






26. A record that must be preserved and available for retrieval if needed.






27. To segregate for the purposes of labeling






28. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






29. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






30. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






31. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






32. Measures followed to restore critical functions following a security incident.






33. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






34. To stop damage from spreading






35. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






36. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. Planning for the delegation of authority required when decisions must be made without the normal chain of command






38. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






39. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






40. Security policy - procedures - and compliance enforcement






41. With enough computing power trying all possible combinations






42. Part of a transaction control for a database which informs the database of the last recorded transaction






43. Threats x Vulnerability x Asset Value = Total Risk






44. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






45. Someone who want to know how something works - typically by taking it apart






46. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






47. Periodic - automatic and transparent backup of data in bulk.






48. Intellectual property management technique for identifying after distribution






49. Use of specialized techniques for recovery - authentication - and analysis of electronic data






50. A back up type - where the organization has excess capacity in another location.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests