Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






2. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






3. Potentially retrievable data residue that remains following intended erasure of data.






4. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






5. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






6. A copy of transaction data - designed for querying and reporting






7. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






8. Controls for termination of attempt to access object






9. Trading one for another






10. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


11. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






12. Just enough access to do the job






13. A protocol for the efficient transmission of voice over the Internet






14. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






15. Unused storage capacity






16. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






17. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






18. To reduce fire






19. A state for operating system tasks only






20. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






21. Control category- to record an adversary's actions






22. An image compression standard for photographs






23. Ertaining to a number system that has just two unique digits.






24. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






25. System mediation of access with the focus on the context of the request






26. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






27. Substitution at the word or phrase level






28. Methodical research of an incident with the purpose of finding the root cause






29. A temporary public file to inform others of a compromised digital certificate






30. For PKI - to have more than one person in charge of a sensitive function






31. Short period of low voltage.






32. Measures followed to restore critical functions following a security incident.






33. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






34. Review of data






35. Momentary loss of power






36. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






37. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






38. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






39. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






40. The property that data meet with a priority expectation of quality and that the data can be relied upon.






41. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






42. An encryption method that has a key as long as the message






43. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






44. The level and label given to an individual for the purpose of compartmentalization






45. Independent malware that requires user interaction to execute






46. Reduces causes of fire






47. RADIUS - TACACS+ - Diameter






48. A programming design concept which abstracts one set of functions from another in a serialized fashion






49. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






50. To execute more than one instruction at an instant in time