Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To smooth out reductions or increases in power






2. A process state - (blocked) needing input before continuing






3. With enough computing power trying all possible combinations






4. A unit of execution






5. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






6. Controls deployed to avert unauthorized and/or undesired actions.






7. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






8. To reduce sudden rises in current






9. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






10. Review of data






11. A layer 2 device that used to connect two network segments and regulate traffic.






12. Reduces causes of fire






13. Can be statistical (monitor behavior) or signature based (watch for known attacks)






14. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






15. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






16. A layer 3 device that used to connect two or more network segments and regulate traffic.






17. A programming design concept which abstracts one set of functions from another in a serialized fashion






18. Potential danger to information or systems






19. A set of laws that the organization agrees to be bound by






20. A documented battle plan for coordinating response to incidents.






21. High frequency noise






22. Eavesdropping on network communications by a third party.






23. An administrative unit or a group of objects and subjects controlled by one reference monitor






24. Recovery alternative which outsources a business function at a cost






25. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






26. Of a system without prior knowledge by the tester or the tested






27. Those who initiate the attack






28. Define the way in which the organization operates.






29. Part of a transaction control for a database which informs the database of the last recorded transaction






30. A telephone exchange for a specific office or business.






31. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






32. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






33. Intellectual property protection for the expression of an idea






34. A layer 2 device that used to connect two or more network segments and regulate traffic.






35. Claiming another's identity at a physical level






36. Intellectual property protection for marketing efforts






37. Narrow scope examination of a system






38. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






39. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






40. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






41. Abstract and mathematical in nature - defining all possible states - transitions and operations






42. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






43. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






44. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






45. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






46. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


47. To set the clearance of a subject or the classification of an object






48. Responsibility for actions






49. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






50. Power surge