Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unchecked data which spills into another location in memory






2. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






3. Try a list of words in passwords or encryption keys






4. A passive network attack involving monitoring of traffic.






5. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






6. A system designed to prevent unauthorized access to or from a private network.






7. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






8. A template for the designing the architecture






9. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






10. Outputs within a given function are the same result






11. Memory management technique which allows data to be moved from one memory address to another






12. An availability attack - to consume resources to the point of exhaustion






13. The level and label given to an individual for the purpose of compartmentalization






14. RADIUS - TACACS+ - Diameter






15. Written step-by-step actions






16. System of law based upon what is good for society






17. Effort/time needed to overcome a protective measure






18. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






19. Some systems are actually run at the alternate site






20. Reduces causes of fire






21. To know more than one job






22. To segregate for the purposes of labeling






23. Claiming another's identity at a physical level






24. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






25. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






26. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






27. Mediation of subject and object interactions






28. Requirement to take time off






29. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






30. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






31. OOP concept of an object at runtime






32. A type of attack involving attempted insertion - deletion or altering of data.






33. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy






34. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






35. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






36. A programming design concept which abstracts one set of functions from another in a serialized fashion






37. A database that contains the name - type - range of values - source and authorization for access for each data element






38. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


39. Searching for wireless networks in a moving car.






40. Firewalls - encryption - and access control lists






41. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






42. A risk assessment method - intrinsic value






43. What is will remain - persistence






44. Consume resources to a point of exhaustion - loss of availability






45. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






46. May be responsible for overall recovery of an organization or unit(s).






47. A state where two subjects can access the same object without proper mediation






48. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination






49. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






50. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective