Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. Total number of keys available that may be selected by the user of a cryptosystem






3. A device that converts between digital and analog representation of data.






4. Information about a particular data set






5. A trusted issuer of digital certificates






6. The core of a computer that calculates






7. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






8. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






9. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






10. Malware that makes many small changes over time to a single data point or system






11. Potentially retrievable data residue that remains following intended erasure of data.






12. Maximum tolerance for loss of certain business function - basis of strategy






13. People who interact with assets






14. Sudden rise in voltage in the power supply.






15. Just enough access to do the job






16. State of computer - to be running a process






17. Autonomous malware that requires a flaw in a service






18. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






19. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






20. A programming design concept which abstracts one set of functions from another in a serialized fashion






21. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






22. The property that data meet with a priority expectation of quality and that the data can be relied upon.






23. With enough computing power trying all possible combinations






24. Potential danger to information or systems






25. An image compression standard for photographs






26. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






27. Real-time data backup ( Data Mirroring)






28. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






29. A one way - directed graph which indicates confidentiality or integrity flow






30. The chance that something negative will occur






31. Planning with a goal of returning to the normal business function






32. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






33. To reduce sudden rises in current






34. Consume resources to a point of exhaustion - loss of availability






35. Reduces causes of fire






36. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






37. Some systems are actually run at the alternate site






38. Objects or programming that looks the different but act same






39. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






40. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






41. The core logic engine of an operating system which almost never changes






42. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






43. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






44. A choice in risk management - to implement a control that limits or lessens negative effects






45. Most granular organization of controls






46. A process state - (blocked) needing input before continuing






47. Periodic - automatic and transparent backup of data in bulk.






48. A computer designed for the purpose of studying adversaries






49. Wrong against society






50. Recovery alternative which includes cold site and some equipment and infrastructure is available