Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






2. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






3. Forgery of the sender's email address in an email header.






4. Deals with discretionary protection






5. Pertaining to law - lending it self to one side of an argument






6. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






7. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






8. The event signaling an IDS to produce an alarm when no attack has taken place






9. Communicate to stakeholders






10. An event which stops business from continuing.






11. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






12. Just enough access to do the job






13. Renders the record inaccessible to the database management system






14. For PKI - to store another copy of a key






15. Individuals and departments responsible for the storage and safeguarding of computerized data.






16. Vehicle or tool that exploits a weakness






17. Most granular organization of controls






18. Try a list of words in passwords or encryption keys






19. Recovery alternative - complete duplication of services including personnel






20. Information about a particular data set






21. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination






22. Converts source code to an executable






23. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






24. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






25. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






26. Moving letters around






27. Descrambling the encrypted message with the corresponding key






28. The collection and summation of risk data relating to a particular asset and controls for that asset






29. Process of statistically testing a data set for the likelihood of relevant information.






30. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






31. Line by line translation from a high level language to machine code






32. With enough computing power trying all possible combinations






33. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






34. The managerial approval to operate a system based upon knowledge of risk to operate






35. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






36. Lower frequency noise






37. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






38. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






39. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






40. Return to a normal state






41. Communication of a security incident to stakeholders and data owners.






42. More than one processor sharing same memory - also know as parallel systems






43. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






44. An encryption method that has a key as long as the message






45. Tool which mediates access






46. All of the protection mechanism in a computer system






47. Small data files written to a user's hard drive by a web server.






48. Requirement to take time off






49. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






50. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183