Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small data warehouse






2. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






3. Program instructions based upon the CPU's specific architecture






4. Is secondhand and usually not admissible in court






5. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






6. Intellectual property protection for an invention






7. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






8. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






9. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


10. System of law based upon what is good for society






11. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






12. A distributed system's transaction control that requires updates to complete or rollback






13. Identification and notification of an unauthorized and/or undesired action






14. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






15. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






16. A disturbance that degrades performance of electronic devices and electronic communications.






17. To load the first piece of software that starts a computer.






18. Converts a high level language into machine language






19. Joining two pieces of text






20. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






21. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






22. To smooth out reductions or increases in power






23. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






24. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






25. The problems solving state - the opposite of supervisor mode






26. Summary of a communication for the purpose of integrity






27. Control type- that is communication based - typically written or oral






28. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






29. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






30. High level design or model with a goal of consistency - integrity - and balance






31. Uncleared buffers or media






32. Effort/time needed to overcome a protective measure






33. Substitution at the word or phrase level






34. Collection of data on business functions which determines the strategy of resiliency






35. A group or network of honeypots






36. Malware that makes many small changes over time to a single data point or system






37. To stop damage from spreading






38. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






39. To move from location to location - keeping the same function






40. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






41. Transaction controls for a database - a return to a previous state






42. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






43. All of the protection mechanism in a computer system






44. Unauthorized access of network devices.






45. A choice in risk management - to convince another to assume risk - typically by payment






46. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






47. Eavesdropping on network communications by a third party.






48. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






49. Written step-by-step actions






50. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components