Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






2. Record of system activity - which provides for monitoring and detection.






3. For PKI - to have more than one person in charge of a sensitive function






4. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






5. Outputs within a given function are the same result






6. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






7. A secure connection to another network.






8. A computer designed for the purpose of studying adversaries






9. For PKI - to store another copy of a key






10. Define the way in which the organization operates.






11. Sudden rise in voltage in the power supply.






12. Autonomous malware that requires a flaw in a service






13. A record that must be preserved and available for retrieval if needed.






14. The hard drive






15. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.






16. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






17. Abstract and mathematical in nature - defining all possible states - transitions and operations






18. More than one processor sharing same memory - also know as parallel systems






19. Computing power will double every 18 months

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






21. Third party processes used to organize the implementation of an architecture






22. Pertaining to law - verified as real






23. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






24. Information about a particular data set






25. A type of attack involving attempted insertion - deletion or altering of data.






26. Using small special tools all tumblers of the lock are aligned - opening the door






27. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






28. Another subject cannot see an ongoing or pending update until it is complete






29. Initial surge of current






30. Recovery alternative - everything needed for the business function - except people and last backup






31. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






32. Recovery alternative - short-term - high cost movable processing location






33. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






34. Memory management technique which allows data to be moved from one memory address to another






35. The partial or full duplication of data from a source database to one or more destination databases.






36. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






37. A protocol for the efficient transmission of voice over the Internet






38. An alert or alarm that is triggered when no actual attack has taken place






39. Reduction of voltage by the utility company for a prolonged period of time






40. A template for the designing the architecture






41. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






42. Two certificate authorities that trust each other






43. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






44. Recording the Who What When Where How of evidence






45. A subnetwork with storage devices servicing all servers on the attached network.






46. A layer 3 device that used to connect two or more network segments and regulate traffic.






47. Guidelines within an organization that control the rules and configurations of an IDS






48. Hiding the fact that communication has occurred






49. Vehicle or tool that exploits a weakness






50. More than one CPU on a single board