Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OOP concept of a distinct copy of the class






2. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






3. The chance that something negative will occur






4. Actions measured against either a policy or what a reasonable person would do






5. To set the clearance of a subject or the classification of an object






6. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






7. Methodical research of an incident with the purpose of finding the root cause






8. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






9. A hash that has been further encrypted with a symmetric algorithm






10. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






11. Eavesdropping on network communications by a third party.






12. A distributed system's transaction control that requires updates to complete or rollback






13. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






14. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






15. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






16. Tool which mediates access






17. An asymmetric cryptography mechanism that provides authentication.






18. Uses two or more legal systems






19. Induces a crime - tricks a person - and is illegal






20. To execute more than one instruction at an instant in time






21. To load the first piece of software that starts a computer.






22. Intellectual property protection for marketing efforts






23. Control category- to discourage an adversary from attempting to access






24. Recovery alternative - short-term - high cost movable processing location






25. Scrambled form of the message or data






26. Object based description of a single resource and the permission each subject






27. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






28. High level design or model with a goal of consistency - integrity - and balance






29. Outputs within a given function are the same result






30. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






31. What is will remain - persistence






32. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






33. Return to a normal state






34. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






35. Intermediate level - pertaining to planning






36. Descrambling the encrypted message with the corresponding key






37. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






38. Planning with a goal of returning to the normal business function






39. To move from location to location - keeping the same function






40. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






41. A program with an inappropriate second purpose






42. State of computer - to be running a process






43. Final purpose or result






44. Data or interference that can trigger a false positive






45. To smooth out reductions or increases in power






46. A signal suggesting a system has been or is being attacked.






47. More than one CPU on a single board






48. Control category- to record an adversary's actions






49. Code breaking - practice of defeating the protective properties of cryptography.






50. Binary decision by a system of permitting or denying access to the entire system