Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A test conducted on one or more components of a plan under actual operating conditions.






2. A basic level of network access control that is based upon information contained in the IP packet header.






3. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


4. Methodical research of an incident with the purpose of finding the root cause






5. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






6. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






7. Most granular organization of controls






8. A disturbance that degrades performance of electronic devices and electronic communications.






9. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






10. Mathematical function that determines the cryptographic operations






11. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






12. To reduce fire






13. A backup of data located where staff can gain access immediately






14. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






15. Object based description of a system or a collection of resources






16. For PKI - to have more than one person in charge of a sensitive function






17. A protocol for the efficient transmission of voice over the Internet






18. Converts source code to an executable






19. A design methodology which executes in a linear one way fashion






20. A software design technique for abstraction of a process






21. Wrong against society






22. A condition in which neither party is willing to stop their activity for the other to complete






23. Impossibility of denying authenticity and identity






24. Code breaking - practice of defeating the protective properties of cryptography.






25. Indivisible - data field must contain only one value that either all transactions take place or none do






26. A state where two subjects can access the same object without proper mediation






27. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






28. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






29. Policy or stated actions






30. The hard drive






31. Moving the alphabet intact a certain number spaces






32. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






33. OOP concept of a distinct copy of the class






34. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






35. Converts a high level language into machine language






36. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






37. More than one CPU on a single board






38. The chance that something negative will occur






39. Organized group of compromised computers






40. A programming device use in development to circumvent controls






41. To execute more than one instruction at an instant in time






42. Deals with discretionary protection






43. Initial surge of current






44. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






45. Communication of a security incident to stakeholders and data owners.






46. Review of data






47. A running key using a random key that is never used again






48. Statistical probabilities of a collision are more likely than one thinks






49. Pertaining to law - lending it self to one side of an argument






50. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc