Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recognition of an individual's assertion of identity.






2. A covert storage channel on the file attribute






3. A trusted issuer of digital certificates






4. The property that data meet with a priority expectation of quality and that the data can be relied upon.






5. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






6. Requires security labels for all subjects and devices - the existence of a trusted path - routine covert channel analysis - and provision of separate administrator functionality.






7. Two different keys decrypt the same cipher text






8. To move from location to location - keeping the same function






9. To load the first piece of software that starts a computer.






10. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






11. Collection of data on business functions which determines the strategy of resiliency






12. A process state - to be executing a process on the CPU






13. An individuals conduct that violates government laws developed to protect the public






14. A back up type - where the organization has excess capacity in another location.






15. Object reuse protection and auditing






16. A database that contains the name - type - range of values - source and authorization for access for each data element






17. Independent malware that requires user interaction to execute






18. The hard drive






19. A Trojan horse with the express underlying purpose of controlling host from a distance






20. The principles a person sets for themselves to follow






21. A perpetrator leaves something behind or takes something with them at the scene of a crime

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. The technical and risk assesment of a system within the context of the operating environment






23. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






24. Evaluation of a system without prior knowledge by the tester






25. Fault tolerance for power






26. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






27. Summary of a communication for the purpose of integrity






28. A mathematical tool for verifying no unintentional changes have been made






29. A process state - to be either be unable to run waiting for an external event or terminated






30. Indivisible - data field must contain only one value that either all transactions take place or none do






31. Someone who want to know how something works - typically by taking it apart






32. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






33. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






34. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






35. Sphere of influence






36. A state where two subjects can access the same object without proper mediation






37. Third party processes used to organize the implementation of an architecture






38. OOP concept of a taking attributes from the original or parent






39. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






40. Return to a normal state






41. A layer 2 device that used to connect two or more network segments and regulate traffic.






42. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






43. OOP concept of a class's details to be hidden from object






44. A program that waits for a condition or time to occur that executes an inappropriate activity






45. Quantity of risk remaining after a control is applied






46. Pertaining to law - high degree of veracity






47. Joining two pieces of text






48. Using many alphabets






49. Intellectual property protection for an confidential and critical process






50. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.