Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An event which stops business from continuing.






2. Unsolicited commercial email






3. For PKI - decertify an entities certificate






4. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






5. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






6. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






7. Using small special tools all tumblers of the lock are aligned - opening the door






8. Code breaking - practice of defeating the protective properties of cryptography.






9. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






10. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






11. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


12. To reduce sudden rises in current






13. Location to perform the business function






14. Statistical probabilities of a collision are more likely than one thinks






15. Low level - pertaining to planning






16. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






17. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






18. Potentially retrievable data residue that remains following intended erasure of data.






19. Two different keys decrypt the same cipher text






20. Information about a particular data set






21. Recovery alternative - complete duplication of services including personnel






22. Autonomous malware that requires a flaw in a service






23. A unit of execution






24. Moving letters around






25. Granular decision by a system of permitting or denying access to a particular resource on the system






26. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






27. Communicate to stakeholders






28. A process state - to be executing a process on the CPU






29. Hardware or software that is part of a larger system






30. To collect many small pieces of data






31. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






32. To start business continuity processes






33. Owner directed mediation of access






34. An individuals conduct that violates government laws developed to protect the public






35. Most granular organization of controls






36. The property that data meet with a priority expectation of quality and that the data can be relied upon.






37. Quantity of risk remaining after a control is applied






38. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






39. A type of attack involving attempted insertion - deletion or altering of data.






40. A database backup type which records at the transaction level






41. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






42. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.






43. A set of laws that the organization agrees to be bound by






44. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






45. A secure connection to another network.






46. One entity with two competing allegiances






47. Subset of operating systems components dedicated to protection mechanisms






48. Recording activities at the keyboard level






49. A mobilized resource purchased or contracted for the purpose of business recovery.






50. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests