Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Claiming another's identity at a physical level






2. Security policy - procedures - and compliance enforcement






3. Malware that subverts the detective controls of an operating system






4. The one person responsible for data - its classification and control setting






5. OOP concept of a distinct copy of the class






6. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






7. Control category- to discourage an adversary from attempting to access






8. Hiding the fact that communication has occurred






9. Substitution at the word or phrase level






10. To stop damage from spreading






11. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






12. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






13. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






14. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






15. Interception of a communication session by an attacker.






16. Representatives from each functional area or department get together and walk through the plan from beginning to end.






17. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






18. A system that enforces an access control policy between two networks.






19. Line noise that is superimposed on the supply circuit.






20. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






21. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






22. Vehicle stopping object






23. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






24. A design methodology which executes in a linear one way fashion






25. Encryption system using a pair of mathematically related unequal keys






26. Two different keys decrypt the same cipher text






27. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






28. Sudden rise in voltage in the power supply.






29. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






30. Physical description on the exterior of an object that communicates the existence of a label






31. Fault tolerance for power






32. Uncleared buffers or media






33. Unsolicited advertising software






34. Act of scrambling the cleartext message by using a key.






35. OOP concept of a taking attributes from the original or parent






36. A collection of data or information that has a name






37. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






38. Owner directed mediation of access






39. An administrative unit or a group of objects and subjects controlled by one reference monitor






40. Using many alphabets






41. Eavesdropping on network communications by a third party.






42. To break a business process into separate functions and assign to different people






43. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






44. Final purpose or result






45. An asymmetric cryptography mechanism that provides authentication.






46. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






47. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






48. A type of attack involving attempted insertion - deletion or altering of data.






49. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






50. Subjects will not interact with each other's objects