Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Real-time - automatic and transparent backup of data.






2. Reduction of voltage by the utility company for a prolonged period of time






3. Intellectual property protection for the expression of an idea






4. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






5. Program that inappropriately collects private data or activity






6. The one person responsible for data - its classification and control setting






7. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






8. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






9. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






10. Encryption system using shared key/private key/single key/secret key






11. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.






12. Process of statistically testing a data set for the likelihood of relevant information.






13. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






14. A backup of data located where staff can gain access immediately






15. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






16. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






17. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






18. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






19. Part of a transaction control for a database which informs the database of the last recorded transaction






20. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






21. To assert or claim credentialing to an authentication system






22. A template for the designing the architecture






23. Communication of a security incident to stakeholders and data owners.






24. Written suggestions that direct choice to a few alternatives






25. Ertaining to a number system that has just two unique digits.






26. The guardian of asset(s) - a maintenance activity






27. A software design technique for abstraction of a process






28. Hitting a filed down key in a lock with a hammer to open without real key






29. To load the first piece of software that starts a computer.






30. Unchecked data which spills into another location in memory






31. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






32. Control category - more than one control on a single asset






33. To create a copy of data as a precaution against the loss or damage of the original data.






34. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






35. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






36. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






37. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






38. Joining two pieces of text






39. A secure connection to another network.






40. Subjects will not interact with each other's objects






41. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






42. Pertaining to law - accepted by a court






43. To break a business process into separate functions and assign to different people






44. Event(s) that cause harm






45. High degree of visual control






46. The collection and summation of risk data relating to a particular asset and controls for that asset






47. Forging of an IP address.






48. To reduce fire






49. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






50. Standard for the establishment - implementation - control - and improvement of the Information Security Management System