Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






2. A running key using a random key that is never used again






3. Wrong against society






4. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






5. OOP concept of a class's details to be hidden from object






6. Converts a high level language into machine language






7. A hash that has been further encrypted with a symmetric algorithm






8. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






9. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






10. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






11. Someone who want to know how something works - typically by taking it apart






12. An administrative unit or a group of objects and subjects controlled by one reference monitor






13. Sudden rise in voltage in the power supply.






14. Real-time - automatic and transparent backup of data.






15. A backup type - for databases at a point in time






16. Short period of low voltage.






17. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






18. To reduce sudden rises in current






19. Mitigate damage by isolating compromised systems from the network.






20. Location to perform the business function






21. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






22. State of computer - to be running a process






23. Malware that subverts the detective controls of an operating system






24. Maintenance procedures outline the process for the review and update of business continuity plans.






25. For PKI - decertify an entities certificate






26. Less granular organization of controls -






27. Lower frequency noise






28. Vehicle or tool that exploits a weakness






29. Memory - RAM






30. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






31. Recognition of an individual's assertion of identity.






32. Maximum tolerance for loss of certain business function - basis of strategy






33. Reduces causes of fire






34. An availability attack - to consume resources to the point of exhaustion from multiple vectors






35. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






36. A control after attack






37. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






38. Amount of time for restoring a business process or function to normal operations without major loss






39. Written step-by-step actions






40. Claiming another's identity at a physical level






41. A choice in risk management - to convince another to assume risk - typically by payment






42. A electronic attestation of identity by a certificate authority






43. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






44. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






45. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






46. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






47. An image compression standard for photographs






48. Guidelines within an organization that control the rules and configurations of an IDS






49. Can be statistical (monitor behavior) or signature based (watch for known attacks)






50. Narrow scope examination of a system