Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A backup type - for databases at a point in time






2. Recovery alternative - everything needed for the business function - except people and last backup






3. A distributed system's transaction control that requires updates to complete or rollback






4. Unauthorized wireless network access device.






5. To collect many small pieces of data






6. Another subject cannot see an ongoing or pending update until it is complete






7. Wrong against society






8. Malware that subverts the detective controls of an operating system






9. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






10. A back up type - where the organization has excess capacity in another location.






11. Lower frequency noise






12. Written internalized or nationalized norms that are internal to an organization






13. Potentially retrievable data residue that remains following intended erasure of data.






14. Most granular organization of controls






15. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






16. Control category- to give instructions or inform






17. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






18. Inappropriate data






19. Unchecked data which spills into another location in memory






20. Substitution at the word or phrase level






21. A software design technique for abstraction of a process






22. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






23. Memory management technique which allows data to be moved from one memory address to another






24. Sudden rise in voltage in the power supply.






25. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






26. Third party processes used to organize the implementation of an architecture






27. A system that enforces an access control policy between two networks.






28. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






29. Someone who want to know how something works - typically by taking it apart






30. Eavesdropping on network communications by a third party.






31. Record history of incident






32. Pertaining to law - high degree of veracity






33. A process state - to be either be unable to run waiting for an external event or terminated






34. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






35. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






36. Memory - RAM






37. A Trojan horse with the express underlying purpose of controlling host from a distance






38. Encryption system using shared key/private key/single key/secret key






39. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






40. Periodic - automatic and transparent backup of data in bulk.






41. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






42. Actions measured against either a policy or what a reasonable person would do






43. Control category - more than one control on a single asset






44. Memory management technique that allows two processes to run concurrently without interaction






45. Dedicated fast memory located on the same board as the CPU






46. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






47. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






48. A passive network attack involving monitoring of traffic.






49. Impossibility of denying authenticity and identity






50. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.