Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who wants to cause harm






2. Encryption system using a pair of mathematically related unequal keys






3. Communication of a security incident to stakeholders and data owners.






4. Substitution at the word or phrase level






5. Final purpose or result






6. The core logic engine of an operating system which almost never changes






7. High level - pertaining to planning






8. Trading one for another






9. Wrong against society






10. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






11. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






12. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






13. Collection of data on business functions which determines the strategy of resiliency






14. Binary decision by a system of permitting or denying access to the entire system






15. People who interact with assets






16. A database that contains the name - type - range of values - source and authorization for access for each data element






17. An encryption method that has a key as long as the message






18. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






19. Mathematical function that determines the cryptographic operations






20. Unchecked data which spills into another location in memory






21. Periodic - automatic and transparent backup of data in bulk.






22. Control category- to give instructions or inform






23. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






24. A hash that has been further encrypted with a symmetric algorithm






25. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






26. Weakness or flaw in an asset






27. OOP concept of a class's details to be hidden from object






28. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






29. Ertaining to a number system that has just two unique digits.






30. The hard drive






31. Eight bits.






32. Potential danger to information or systems






33. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.






34. Record of system activity - which provides for monitoring and detection.






35. An availability attack - to consume resources to the point of exhaustion






36. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






37. A template for the designing the architecture






38. Code making






39. Security policy - procedures - and compliance enforcement






40. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






41. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






42. Recovery alternative which outsources a business function at a cost






43. A covert storage channel on the file attribute






44. Memory management technique that allows two processes to run concurrently without interaction






45. Pertaining to law - lending it self to one side of an argument






46. A system designed to prevent unauthorized access to or from a private network.






47. Specific format of technical and physical controls that support the chosen framework and the architecture






48. Written suggestions that direct choice to a few alternatives






49. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






50. A layer 2 device that used to connect two network segments and regulate traffic.