Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Define the way in which the organization operates.






2. False memory reference






3. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






4. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






5. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






6. A process state - to be executing a process on the CPU






7. A computer designed for the purpose of studying adversaries






8. The chance that something negative will occur






9. For PKI - to have more than one person in charge of a sensitive function






10. A secure connection to another network.






11. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






12. Evidence must be: admissible - authentic - complete - accurate - and convincing






13. The connection between a wireless and wired network.






14. Potential danger to information or systems






15. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






16. Third party processes used to organize the implementation of an architecture






17. Control type- that is communication based - typically written or oral






18. Inference about encrypted communications






19. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






20. Planning with a goal of returning to the normal business function






21. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






22. Hitting a filed down key in a lock with a hammer to open without real key






23. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






24. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






25. Intellectual property protection for an confidential and critical process






26. An individuals conduct that violates government laws developed to protect the public






27. Statistical probabilities of a collision are more likely than one thinks






28. Controls for termination of attempt to access object






29. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






30. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






31. Autonomous malware that requires a flaw in a service






32. A telephone exchange for a specific office or business.






33. To execute more than one instruction at an instant in time






34. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.






35. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






36. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






37. Owner directed mediation of access






38. What is will remain - persistence






39. Those who initiate the attack






40. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






41. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






42. Memory - RAM






43. A world-wide wireless technology






44. A planned or unplanned interruption in system availability.






45. Granular decision by a system of permitting or denying access to a particular resource on the system






46. System of law based upon precedence - with major divisions of criminal - tort - and administrative






47. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






48. Of a system without prior knowledge by the tester or the tested






49. To evaluate the current situation and make basic decisions as to what to do






50. Record of system activity - which provides for monitoring and detection.