Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






2. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






3. Of a system without prior knowledge by the tester or the tested






4. A choice in risk management - to implement a control that limits or lessens negative effects






5. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






6. Line noise that is superimposed on the supply circuit.






7. Return to a normal state






8. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






9. Inappropriate data






10. People protect their domain






11. Potentially retrievable data residue that remains following intended erasure of data.






12. A technology that reduces the size of a file.






13. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






14. Uses two or more legal systems






15. Periodic - automatic and transparent backup of data in bulk.






16. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






17. To reduce fire






18. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






19. A risk assessment method - intrinsic value






20. The property that data meet with a priority expectation of quality and that the data can be relied upon.






21. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






22. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


23. A device that sequentially switches multiple analog inputs to the output.






24. A unit of execution






25. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






26. Intellectual property protection for an invention






27. A control after attack






28. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






29. High frequency noise






30. Recovery alternative which includes cold site and some equipment and infrastructure is available






31. Collection of data on business functions which determines the strategy of resiliency






32. All of the protection mechanism in a computer system






33. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






34. Written internalized or nationalized norms that are internal to an organization






35. Mediation of covert channels must be addressed






36. An individuals conduct that violates government laws developed to protect the public






37. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






38. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






39. Security policy - procedures - and compliance enforcement






40. A control before attack






41. A hash that has been further encrypted with a symmetric algorithm






42. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






43. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






44. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






45. Renders the record inaccessible to the database management system






46. Reprogrammable basic startup instructions






47. Pertaining to law - accepted by a court






48. Methodical research of an incident with the purpose of finding the root cause






49. DoS - Spoofing - dictionary - brute force - wardialing






50. A running key using a random key that is never used again