Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






2. An event which stops business from continuing.






3. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






4. The chance that something negative will occur






5. Written step-by-step actions






6. Define the way in which the organization operates.






7. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






8. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






9. Specific format of technical and physical controls that support the chosen framework and the architecture






10. A set of laws that the organization agrees to be bound by






11. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






12. A Trojan horse with the express underlying purpose of controlling host from a distance






13. A mail server that improperly allows inbound SMTP connections for domains it does not serve.






14. A computer designed for the purpose of studying adversaries






15. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






16. The collection and summation of risk data relating to a particular asset and controls for that asset






17. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






18. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






19. A system designed to prevent unauthorized access to or from a private network.






20. Control type- that is communication based - typically written or oral






21. Responsibility for actions






22. The problems solving state - the opposite of supervisor mode






23. Reprogrammable basic startup instructions






24. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






25. A program that waits for a condition or time to occur that executes an inappropriate activity






26. Vehicle or tool that exploits a weakness






27. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






28. A race condition where the security changes during the object's access






29. Binary decision by a system of permitting or denying access to the entire system






30. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






31. Periodic - automatic and transparent backup of data in bulk.






32. A process state - (blocked) needing input before continuing






33. To reduce sudden rises in current






34. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






35. A process state - to be either be unable to run waiting for an external event or terminated






36. System directed mediation of access with labels






37. A device that converts between digital and analog representation of data.






38. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






39. Creation distribution update and deletion






40. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






41. A system that enforces an access control policy between two networks.






42. Mitigation of system or component loss or interruption through use of backup capability.






43. Mediation of covert channels must be addressed






44. Identification and notification of an unauthorized and/or undesired action






45. Lower frequency noise






46. A distributed system's transaction control that requires updates to complete or rollback






47. Narrow scope examination of a system






48. A mobilized resource purchased or contracted for the purpose of business recovery.






49. OOP concept of a class's details to be hidden from object






50. False memory reference