Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Impossibility of denying authenticity and identity






2. Third party processes used to organize the implementation of an architecture






3. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






4. Summary of a communication for the purpose of integrity






5. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






6. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






7. A test conducted on one or more components of a plan under actual operating conditions.






8. Memory management technique that allows two processes to run concurrently without interaction






9. Long term knowledge building






10. System of law based upon what is good for society






11. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






12. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






13. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






14. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






15. To break a business process into separate functions and assign to different people






16. Define the way in which the organization operates.






17. For PKI - to have more than one person in charge of a sensitive function






18. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






19. Control category- to record an adversary's actions






20. Uncleared buffers or media






21. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






22. A world-wide wireless technology






23. An attack involving the hijacking of a TCP session by predicting a sequence number.






24. To assert or claim credentialing to an authentication system






25. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


26. Requirement to take time off






27. A program that waits for a condition or time to occur that executes an inappropriate activity






28. Tool which mediates access






29. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






30. To know more than one job






31. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






32. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.






33. OOP concept of a template that consist of attributes and behaviors






34. Mediation of covert channels must be addressed






35. Eavesdropping on network communications by a third party.






36. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






37. Recovery alternative - a building only with sufficient power - and HVAC






38. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






39. Outputs within a given function are the same result






40. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






41. A program with an inappropriate second purpose






42. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






43. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






44. Communicate to stakeholders






45. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






46. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






47. Program that inappropriately collects private data or activity






48. Recording the Who What When Where How of evidence






49. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






50. A shield against leakage of electromagnetic signals.