Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






2. Specific format of technical and physical controls that support the chosen framework and the architecture






3. A temporary public file to inform others of a compromised digital certificate






4. An event which stops business from continuing.






5. Control category- to record an adversary's actions






6. Recognition of an individual's assertion of identity.






7. What is will remain - persistence






8. An asymmetric cryptography mechanism that provides authentication.






9. Recovery alternative - everything needed for the business function - except people and last backup






10. For PKI - to have more than one person in charge of a sensitive function






11. Renders the file inaccessible to the operating system - available to reuse for data storage.






12. A state where two subjects can access the same object without proper mediation






13. Potentially retrievable data residue that remains following intended erasure of data.






14. Written internalized or nationalized norms that are internal to an organization






15. Forgery of the sender's email address in an email header.






16. Third party processes used to organize the implementation of an architecture






17. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






18. Periodic - automatic and transparent backup of data in bulk.






19. Deals with discretionary protection






20. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






21. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






22. A device that converts between digital and analog representation of data.






23. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






24. Control category- to restore to a previous state by removing the adversary and or the results of their actions






25. State of computer - to be running a process






26. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






27. Owner directed mediation of access






28. An alert or alarm that is triggered when no actual attack has taken place






29. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






30. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






31. Recording activities at the keyboard level






32. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






33. Asymmetric encryption of a hash of message






34. Regular operations are stopped and where processing is moved to the alternate site.






35. One way encryption






36. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






37. Reduction of voltage by the utility company for a prolonged period of time






38. Pertaining to law - lending it self to one side of an argument






39. The study of cryptography and cryptanalysis






40. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






41. Hardware or software that is part of a larger system






42. System of law based upon what is good for society






43. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






44. Define the way in which the organization operates.






45. Written suggestions that direct choice to a few alternatives






46. Object based description of a system or a collection of resources






47. Scrambled form of the message or data






48. A back up type - where the organization has excess capacity in another location.






49. Can be statistical (monitor behavior) or signature based (watch for known attacks)






50. A type a computer memory that temporarily stores frequently used information for quick access.