Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Creation distribution update and deletion






2. Intellectual property protection for the expression of an idea






3. To execute more than one instruction at an instant in time






4. Recording activities at the keyboard level






5. A process state - to be either be unable to run waiting for an external event or terminated






6. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






7. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






8. The first rating that requires security labels






9. Specific format of technical and physical controls that support the chosen framework and the architecture






10. Alerts personnel to the presence of a fire






11. A choice in risk management - to implement a control that limits or lessens negative effects






12. Prolonged loss of commercial power






13. Trading one for another






14. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






15. Objects or programming that looks the different but act same






16. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






17. Pertaining to law - accepted by a court






18. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






19. Review of data






20. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






21. A physical enclosure for verifying identity before entry to a facility






22. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






23. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






24. A device that provides the functions of both a bridge and a router.






25. An encryption method that has a key as long as the message






26. Tool which mediates access






27. A design methodology which executes in a linear one way fashion






28. Moving the alphabet intact a certain number spaces






29. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






30. A mathematical tool for verifying no unintentional changes have been made






31. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






32. Intellectual property protection for an invention






33. A control after attack






34. Effort/time needed to overcome a protective measure






35. Pertaining to law - verified as real






36. Security policy - procedures - and compliance enforcement






37. Dedicated fast memory located on the same board as the CPU






38. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






39. A trusted issuer of digital certificates






40. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






41. Only the key protects the encrypted information

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


42. State of computer - to be running a process






43. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






44. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






45. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






46. A test conducted on one or more components of a plan under actual operating conditions.






47. Subjects will not interact with each other's objects






48. Business and technical process of applying security software updates in a regulated periodic way






49. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






50. Consume resources to a point of exhaustion - loss of availability