Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






2. Renders the record inaccessible to the database management system






3. A collection of data or information that has a name






4. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






5. For PKI - to have more than one person in charge of a sensitive function






6. A secure connection to another network.






7. Intermediate level - pertaining to planning






8. Firewalls - encryption - and access control lists






9. Is secondhand and usually not admissible in court






10. Vehicle stopping object






11. A back up type - where the organization has excess capacity in another location.






12. System mediation of access with the focus on the context of the request






13. Pertaining to law - accepted by a court






14. Memory - RAM






15. Eavesdropping on network communications by a third party.






16. The level and label given to an individual for the purpose of compartmentalization






17. Policy or stated actions






18. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






19. Power surge






20. Requirement to take time off






21. OOP concept of a taking attributes from the original or parent






22. To assert or claim credentialing to an authentication system






23. Mediation of subject and object interactions






24. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






25. People who interact with assets






26. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






27. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.






28. Program instructions based upon the CPU's specific architecture






29. Memory management technique which allows data to be moved from one memory address to another






30. Security policy - procedures - and compliance enforcement






31. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






32. The study of cryptography and cryptanalysis






33. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






34. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






35. The principles a person sets for themselves to follow






36. Granular decision by a system of permitting or denying access to a particular resource on the system






37. With enough computing power trying all possible combinations






38. Requirement of access to data for a clearly defined purpose






39. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






40. An administrative unit or a group of objects and subjects controlled by one reference monitor






41. A system designed to prevent unauthorized access to or from a private network.






42. A risk assessment method - measurable real money cost






43. To move from location to location - keeping the same function






44. A condition in which neither party is willing to stop their activity for the other to complete






45. Two certificate authorities that trust each other






46. State of computer - to be running a process






47. High level design or model with a goal of consistency - integrity - and balance






48. For PKI - to store another copy of a key






49. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






50. A subnetwork with storage devices servicing all servers on the attached network.