Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Evidence must be: admissible - authentic - complete - accurate - and convincing






2. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






3. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






4. Recovery alternative which outsources a business function at a cost






5. Deals with discretionary protection






6. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






7. Vehicle stopping object






8. Initial surge of current






9. Final purpose or result






10. A Denial of Service attack that floods the target system with connection requests that are not finalized.






11. Security policy - procedures - and compliance enforcement






12. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






13. Control type- that is communication based - typically written or oral






14. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware






15. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






16. A one way - directed graph which indicates confidentiality or integrity flow






17. Intellectual property protection for marketing efforts






18. A physical enclosure for verifying identity before entry to a facility






19. Two different keys decrypt the same cipher text






20. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






21. An availability attack - to consume resources to the point of exhaustion from multiple vectors






22. OOP concept of a distinct copy of the class






23. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


24. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






25. Controls deployed to avert unauthorized and/or undesired actions.






26. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






27. Control category- to give instructions or inform






28. Recovery alternative - a building only with sufficient power - and HVAC






29. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






30. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






31. Collection of data on business functions which determines the strategy of resiliency






32. Try a list of words in passwords or encryption keys






33. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






34. Control category- to restore to a previous state by removing the adversary and or the results of their actions






35. A state for operating system tasks only






36. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. Code breaking - practice of defeating the protective properties of cryptography.






38. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






39. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






40. A copy of transaction data - designed for querying and reporting






41. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






42. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






43. Evaluation of a system without prior knowledge by the tester






44. Location where coordination and execution of BCP or DRP is directed






45. For PKI - decertify an entities certificate






46. Mitigation of system or component loss or interruption through use of backup capability.






47. A choice in risk management - to implement a control that limits or lessens negative effects






48. Asymmetric encryption of a hash of message






49. System mediation of access with the focus on the context of the request






50. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests