Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unsolicited advertising software






2. The partial or full duplication of data from a source database to one or more destination databases.






3. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






4. To assert or claim credentialing to an authentication system






5. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






6. Converts a high level language into machine language






7. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






8. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






9. A documented battle plan for coordinating response to incidents.






10. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






11. Converts source code to an executable






12. Calculation encompassing threats - vulnerabilities and assets






13. Responsibility for actions






14. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






15. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






16. System mediation of access with the focus on the context of the request






17. A one way - directed graph which indicates confidentiality or integrity flow






18. An alert or alarm that is triggered when no actual attack has taken place






19. OOP concept of a template that consist of attributes and behaviors






20. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






21. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






22. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






23. Property that data is represented in the same manner at all times






24. A state for operating system tasks only






25. Guidelines within an organization that control the rules and configurations of an IDS






26. A risk assessment method - measurable real money cost






27. A telephone exchange for a specific office or business.






28. Potential danger to information or systems






29. To break a business process into separate functions and assign to different people






30. Descrambling the encrypted message with the corresponding key






31. A type a computer memory that temporarily stores frequently used information for quick access.






32. Line by line translation from a high level language to machine code






33. Recovery alternative - everything needed for the business function - except people and last backup






34. A collection of data or information that has a name






35. To set the clearance of a subject or the classification of an object






36. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






37. Summary of a communication for the purpose of integrity






38. A template for the designing the architecture






39. Uses two or more legal systems






40. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






41. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. Deals with discretionary protection






43. Independent malware that requires user interaction to execute






44. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






45. An encryption method that has a key as long as the message






46. A process state - to be executing a process on the CPU






47. A backup type - for databases at a point in time






48. A group or network of honeypots






49. An individuals conduct that violates government laws developed to protect the public






50. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management