Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OOP concept of a template that consist of attributes and behaviors






2. Code making






3. A program that waits for a condition or time to occur that executes an inappropriate activity






4. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






5. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






6. A state for operating system tasks only






7. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






8. The connection between a wireless and wired network.






9. A protocol for the efficient transmission of voice over the Internet






10. Calculation encompassing threats - vulnerabilities and assets






11. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






12. An availability attack - to consume resources to the point of exhaustion






13. Trading one for another






14. To start business continuity processes






15. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






16. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






17. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






18. To execute more than one instruction at an instant in time






19. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






20. A process state - to be executing a process on the CPU






21. A type a computer memory that temporarily stores frequently used information for quick access.






22. Recovery alternative which outsources a business function at a cost






23. The technical and risk assesment of a system within the context of the operating environment






24. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






25. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






26. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






27. Recovery alternative - short-term - high cost movable processing location






28. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






29. Claiming another's identity at a physical level






30. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






31. A programming device use in development to circumvent controls






32. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






33. Actions measured against either a policy or what a reasonable person would do






34. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






35. Written suggestions that direct choice to a few alternatives






36. State of computer - to be running a process






37. People who interact with assets






38. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






39. The level and label given to an individual for the purpose of compartmentalization






40. Define the way in which the organization operates.






41. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






42. Sphere of influence






43. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






44. A collection of data or information that has a name






45. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






46. Converts a high level language into machine language






47. High level - pertaining to planning






48. More than one CPU on a single board






49. Program that inappropriately collects private data or activity






50. Record history of incident