Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One way encryption






2. Amount of time for restoring a business process or function to normal operations without major loss






3. A device that provides the functions of both a bridge and a router.






4. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






5. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






6. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






7. To reduce fire






8. Review of data






9. Potentially compromising leakage of electrical or acoustical signals.






10. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






11. A design methodology which addresses risk early and often






12. A device that sequentially switches multiple analog inputs to the output.






13. Used to code/decode a digital data stream.






14. A risk assessment method - intrinsic value






15. One of the key benefits of a network is the ability to share files stored on the server among several users.






16. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






17. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






18. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






19. Evidence must be: admissible - authentic - complete - accurate - and convincing






20. Methodical research of an incident with the purpose of finding the root cause






21. A collection of information designed to reduce duplication and increase integrity






22. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.






23. Using many alphabets






24. Impossibility of denying authenticity and identity






25. A documented battle plan for coordinating response to incidents.






26. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






27. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






28. Lower frequency noise






29. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.






30. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






31. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






32. A set of laws that the organization agrees to be bound by






33. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






34. Converts source code to an executable






35. Written core statements that rarely change






36. Vehicle stopping object






37. Third party processes used to organize the implementation of an architecture






38. Intellectual property protection for an invention






39. Return to a normal state






40. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






41. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






42. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






43. DoS - Spoofing - dictionary - brute force - wardialing






44. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. A process state - to be either be unable to run waiting for an external event or terminated






46. Record history of incident






47. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






48. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






49. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






50. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.