Trivia Quiz On CISSP Exam!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Daniel
D
Daniel
Community Contributor
Quizzes Created: 1 | Total Attempts: 198
| Attempts: 198 | Questions: 29
Please wait...
Question 1 / 29
0 %
0/100
Score 0/100
1. What is the preventative practice of establishing and planning for business related threats and risks?

Explanation

Business continuity planning is the preventative practice of establishing and planning for business-related threats and risks. It involves creating strategies and procedures to ensure that essential business functions can continue during and after a disruption. This includes identifying potential risks, developing response plans, and implementing measures to minimize the impact of a disaster. Business continuity planning aims to protect the organization's reputation, minimize financial losses, and ensure the safety of employees and customers. It is an essential practice for organizations to maintain their operations and recover quickly from any potential disruptions.

Submit
Please wait...
About This Quiz
CISSP Quizzes & Trivia

Explore key concepts of the CISSP exam through this trivia quiz! Dive into security modes like Dedicated, System high, and Multilevel, enhancing your understanding of federal government computing... see moresystems and security clearances. Ideal for professionals aiming to validate their security expertise. see less

2. What is the practice of establishing emergency-response actions following a business related disaster?

Explanation

Disaster recovery planning refers to the practice of establishing emergency-response actions following a business-related disaster. This involves creating a detailed plan that outlines the steps and procedures to be followed in order to recover and restore business operations after a disaster. It includes measures such as data backup, system recovery, and alternative work arrangements to minimize the impact of the disaster on the business.

Submit
3. Third generation language.

Explanation

The given answer is "All Complied Languages (C++, Java)". This is because compiled languages like C++ and Java are considered third-generation languages. These languages require the source code to be compiled into machine code before execution. They provide a higher level of abstraction compared to assembly languages and machine languages, making them easier to read and write. Additionally, these languages offer features like object-oriented programming and memory management, which further simplify the development process.

Submit
4. What security mode allows systems to process information at more than one level of security even when all users do not have appropriate clearances?

Explanation

Multilevel security mode allows systems to process information at more than one level of security even when all users do not have appropriate clearances. In this mode, different levels of security are assigned to different users, and the system ensures that each user can only access information that is within their clearance level. This allows for the simultaneous processing of information at different security levels, increasing efficiency and flexibility in handling sensitive data.

Submit
5. First generation languages.

Explanation

All machine languages refer to the first generation of programming languages. These languages are directly understood by the computer's hardware and are represented by binary code consisting of 0s and 1s. They are low-level languages and provide the most direct control over the computer's hardware. Programmers had to write instructions in machine language to perform any task. As technology advanced, higher-level languages were developed to make programming easier and more efficient. Therefore, the answer "All Machine Languages" is correct as it includes all the programming languages of the first generation.

Submit
6. In what type of addressing scheme is the actual address of the memory location provided to the CPU?

Explanation

Direct addressing is a type of addressing scheme where the actual address of the memory location is provided directly to the CPU. In direct addressing, the instruction contains the memory address where the data is stored or retrieved. The CPU can directly access the memory location specified in the instruction without any additional calculations or transformations. This addressing scheme is simple and efficient as it eliminates the need for any intermediate steps or calculations, allowing for faster data access and processing.

Submit
7. Which one of the following is not a component of the DevOps model?

Explanation

The DevOps model focuses on integrating software development, quality assurance, and IT operations to improve collaboration and efficiency. Information security, although an important aspect of any software development process, is not specifically mentioned as a component of the DevOps model. However, it is important to note that information security should still be considered and integrated into the DevOps practices to ensure the overall security and protection of the software and systems.

Submit
8. Second generation language.

Explanation

All Assembly Languages refers to the second generation language. Assembly language is a low-level programming language that is specific to a particular computer architecture. It uses mnemonic codes and symbols to represent the machine language instructions. Assembly languages are considered second generation languages as they are closer to the machine language and provide more control over the hardware. Assembly languages are specific to each computer architecture and are not portable across different systems.

Submit
9. In what type of addressing scheme uses a value stored in one of the CPU's registers as the base location to start counting?

Explanation

Base+offset addressing is a type of addressing scheme that uses a value stored in one of the CPU's registers as the base location to start counting. In this scheme, the offset is added to the base address to calculate the memory address of the operand. It allows for efficient and flexible memory access, as it enables the programmer to access memory locations relative to a base address. This is particularly useful when working with arrays or data structures where elements are stored in consecutive memory locations.

Submit
10. Fourth generation language.

Explanation

Fourth generation languages (4GLs) are programming languages that are designed to be closer to natural languages, such as English, in order to make programming easier for non-technical users. These languages attempt to approximate natural languages, including SQL, which is commonly used for querying and manipulating databases. By using 4GLs, programmers can write code that is more intuitive and resembles human language, making it easier to understand and use. This can be particularly useful in database management systems, where SQL is commonly used to interact with the database.

Submit
11. Which of the following elements is not necessary in the BCP documentation?

Explanation

The Mobile Site plan is not necessary in the BCP documentation because it is not directly related to the business continuity planning process. The BCP documentation primarily focuses on identifying and assessing risks, developing strategies for risk mitigation, and establishing guidelines for emergency response. The Mobile Site plan, on the other hand, is specific to the organization's mobile infrastructure and is not directly related to the overall business continuity planning process.

Submit
12. What procedure returns business operations and processes to a working state?

Explanation

Recovery is the procedure that returns business operations and processes to a working state after a disruption or failure. It involves restoring systems, data, and infrastructure to their normal functioning, ensuring that the business can resume its operations and minimize any potential losses or damages.

Submit
13. What type of information is not normally included in the risk acceptance/mitigation portion of the BCP.

Explanation

The risk acceptance/mitigation portion of the BCP typically focuses on identifying and evaluating risks, developing strategies to mitigate them, and determining whether to accept or transfer the risks. It does not typically include the identification of insurance policies that apply to specific risks. This information is usually part of the risk transfer process, which involves purchasing insurance coverage to transfer the financial impact of certain risks to an insurance company.

Submit
14. Fifth generation language.

Explanation

The fifth generation language allows programmers to create code using visual interfaces. This means that instead of writing lines of code manually, programmers can use visual tools and drag-and-drop elements to create their programs. This makes programming more accessible to non-technical users and simplifies the development process.

Submit
15. What type of federal government computing system requires that all individuals accessing the system have a need to know all of the information processed by that system?

Explanation

A dedicated federal government computing system requires that all individuals accessing the system have a need to know all of the information processed by that system. This means that only authorized personnel who require access to specific information are allowed to use the system. This ensures that sensitive information is protected and only accessible to those who have a legitimate need for it.

Submit
16. Used to simulate tones of coins being deposited into a pay phone.

Explanation

The term "Red Box" refers to a device that is used to simulate the sound of coins being deposited into a pay phone. This device was commonly used by phone phreakers to make free phone calls by tricking the pay phone into thinking that coins were being inserted. The red color of the box is likely just a descriptive name, as these devices could come in various colors.

Submit
17. Used to simulate 2600 Hz tones to interact directly with telephone networktrunk systems.

Explanation

A blue box is a device used to simulate 2600 Hz tones, which allows users to interact directly with telephone network trunk systems. This device was commonly used by hackers and phreakers in the past to exploit vulnerabilities in the phone system. The blue box could generate the specific tones needed to manipulate the phone network and gain unauthorized access to various services.

Submit
18. What procedure returns business facilities and environments to a working state?

Explanation

Restoration is the correct answer because it refers to the process of returning business facilities and environments to a working state. This involves repairing and recovering any damages or disruptions that may have occurred. Respiration is unrelated to the context of the question, and reparation and recovery may be similar concepts but do not specifically address the restoration of business facilities and environments.

Submit
19. Which one of the following security modes does NOT require that all users have a security clearance for the highest level of information processed by the system?

Explanation

Multilevel security mode does not require that all users have a security clearance for the highest level of information processed by the system. In multilevel security, users are granted access to different levels of information based on their security clearances. This means that users with lower security clearances can access information at their clearance level or below, but not at higher levels. In contrast, dedicated, system high, and compartmented security modes all require that all users have a security clearance for the highest level of information processed by the system.

Submit
20. What action usually closes the identification phase of incident response?

Explanation

The action that usually closes the identification phase of incident response is notifying the incident response team. This means that once the incident has been identified and confirmed, the next step is to inform the incident response team so that they can begin their investigation and take appropriate actions to mitigate the incident. This notification allows the incident response team to start their work and move forward with the incident response process.

Submit
21. On a much smaller scale, _____________ is deployed to repair or restore capability, functionality, or resources following a violation of security policy.

Explanation

Recovery access control is deployed to repair or restore capability, functionality, or resources following a violation of security policy. This type of access control is used to regain control over the affected system or network, recover any lost or compromised data, and restore the system's normal operations. It involves implementing measures such as backup and restore procedures, system patches and updates, and incident response plans to mitigate the impact of security incidents and ensure a quick recovery.

Submit
22. Used to manipulate line voltages to steal long-distance services.

Explanation

A black box is a device that is used to manipulate line voltages in order to steal long-distance services. This means that it can be used to bypass the normal billing systems and make unauthorized long-distance calls without paying for them. The term "black box" is often used to refer to any device or technique used for illegal or unauthorized activities, and in this context, it specifically refers to the device used for stealing long-distance services.

Submit
23. Used to control the phone system.  A dual-tone multifrequency (DTMF) generator (that is, a keypad)

Explanation

A white box is a term used to describe a device or system that is fully accessible and controllable by the user. In the context of the given question, a white box would refer to a device that is used to control the phone system. This device, also known as a dual-tone multifrequency (DTMF) generator or keypad, allows the user to input specific tones or frequencies to interact with the phone system. The white box represents a transparent and open system that can be easily manipulated and controlled by the user.

Submit
24. What type of addressing scheme supplies the CPU with a location that contains the memory address of the actual operand?

Explanation

Indirect addressing is a type of addressing scheme where the CPU is supplied with a location that contains the memory address of the actual operand. In this scheme, the memory address of the operand is stored in a register or memory location, and the CPU retrieves the actual operand from that memory address. This allows for flexibility and dynamic memory access, as the memory address can be changed during program execution.

Submit
25. In which of the following security modes can you be assured that all users have access permissions for all information processed by the system but will not necessarily need to know of all that information?

Explanation

System high security mode ensures that all users have access permissions for all information processed by the system. However, it does not require users to know about all the information. This means that while users can access and process all the information, they may not necessarily be aware of the details or have a need-to-know basis for certain information. System high security mode provides a balance between access and confidentiality, allowing users to perform their tasks without unnecessary exposure to sensitive information.

Submit
26. Once a system is compromised, _____________ is deployed to restore it to its previous known good state.

Explanation

Corrective access control is deployed to restore a compromised system to its previous known good state. This type of access control involves identifying and rectifying any vulnerabilities or weaknesses that allowed the system to be compromised in the first place. It may involve actions such as removing malware, patching software, and implementing stronger security measures to prevent future attacks. By implementing corrective access control, the system can be restored to its previous secure state and protect against further compromises.

Submit
27. In what type of addressing scheme is the data actually supplied to the CPU as an argument?

Explanation

Immediate addressing is a type of addressing scheme where the data is directly supplied to the CPU as an argument. In this scheme, the operand is specified as a part of the instruction itself, rather than referring to a memory location or register. This allows for quick access to the data, as it is readily available within the instruction. Immediate addressing is commonly used for operations that involve constants or literal values.

Submit
28. In what security mode must each user have the access approval and valid need to know for all information processed by a system?

Explanation

In a compartmented security mode, each user must have access approval and a valid need to know for all information processed by a system. This means that users are only granted access to specific compartments or categories of information that are relevant to their job duties and responsibilities. This ensures that sensitive information is only accessible to those who have a legitimate need for it, minimizing the risk of unauthorized disclosure or misuse of information.

Submit
29. Which security mode provides the most granular control over resources and users?

Explanation

System high security mode provides the most granular control over resources and users. This mode ensures that the system is protected at a high level by implementing strict access controls and restrictions. It allows for the classification and compartmentalization of data, ensuring that only authorized users have access to specific resources. System high security mode is designed to prevent unauthorized access and protect sensitive information, making it the most comprehensive and granular security mode available.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 29, 2017
    Quiz Created by
    Daniel
Cancel
  • All
    All (29)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the preventative practice of establishing and planning for...
What is the practice of establishing emergency-response actions...
Third generation language.
What security mode allows systems to process information at more than...
First generation languages.
In what type of addressing scheme is the actual address of the memory...
Which one of the following is not a component of the DevOps model?
Second generation language.
In what type of addressing scheme uses a value stored in one of the...
Fourth generation language.
Which of the following elements is not necessary in the BCP...
What procedure returns business operations and processes to a working...
What type of information is not normally included in the risk...
Fifth generation language.
What type of federal government computing system requires that all...
Used to simulate tones of coins being deposited into a pay phone.
Used to simulate 2600 Hz tones to interact directly with telephone...
What procedure returns business facilities and environments to a...
Which one of the following security modes does NOT require that all...
What action usually closes the identification phase of incident...
On a much smaller scale, _____________ is deployed to repair or...
Used to manipulate line voltages to steal long-distance services.
Used to control the phone system.  A dual-tone...
What type of addressing scheme supplies the CPU with a location that...
In which of the following security modes can you be assured that all...
Once a system is compromised, _____________ is deployed to restore it...
In what type of addressing scheme is the data actually supplied to the...
In what security mode must each user have the access approval and...
Which security mode provides the most granular control over resources...
Alert!

Advertisement