Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OOP concept of a taking attributes from the original or parent






2. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






3. Requirement to take time off






4. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






5. A template for the designing the architecture






6. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






7. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






8. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






9. A distributed system's transaction control that requires updates to complete or rollback






10. Sudden rise in voltage in the power supply.






11. Written step-by-step actions






12. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






13. An image compression standard for photographs






14. To stop damage from spreading






15. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






16. A type of multitasking that allows for more even distribution of computing time among competing request






17. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






18. Controls for termination of attempt to access object






19. Uncheck data input which results in redirection






20. A planned or unplanned interruption in system availability.






21. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






22. To assert or claim credentialing to an authentication system






23. An administrative unit or a group of objects and subjects controlled by one reference monitor






24. Process of statistically testing a data set for the likelihood of relevant information.






25. Act of luring an intruder and is legal.






26. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






27. Two different keys decrypt the same cipher text






28. People protect their domain






29. To break a business process into separate functions and assign to different people






30. Something that happened






31. Periodic - automatic and transparent backup of data in bulk.






32. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






33. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






34. Intellectual property protection for marketing efforts






35. Uses two or more legal systems






36. Pertaining to law - lending it self to one side of an argument






37. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






38. Control category - more than one control on a single asset






39. A type a computer memory that temporarily stores frequently used information for quick access.






40. Object based description of a single resource and the permission each subject






41. Eavesdropping on network communications by a third party.






42. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






43. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






44. Power surge






45. Uncleared buffers or media






46. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






47. Recovery alternative - a building only with sufficient power - and HVAC






48. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






49. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






50. The connection between a wireless and wired network.