Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A race condition where the security changes during the object's access






2. Autonomous malware that requires a flaw in a service






3. Memory management technique which allows subjects to use the same resource






4. Using many alphabets






5. System directed mediation of access with labels






6. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






7. Mitigate damage by isolating compromised systems from the network.






8. Those who initiate the attack






9. Process of statistically testing a data set for the likelihood of relevant information.






10. A device that provides the functions of both a bridge and a router.






11. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.






12. Effort/time needed to overcome a protective measure






13. Uncleared buffers or media






14. Recording the Who What When Where How of evidence






15. Intermediate level - pertaining to planning






16. A disturbance that degrades performance of electronic devices and electronic communications.






17. Substitution at the word or phrase level






18. More than one processor sharing same memory - also know as parallel systems






19. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






20. Mitigation of system or component loss or interruption through use of backup capability.






21. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






22. Forgery of the sender's email address in an email header.






23. A mathematical tool for verifying no unintentional changes have been made






24. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






25. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






26. False memory reference






27. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






28. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






29. Recording activities at the keyboard level






30. Two certificate authorities that trust each other






31. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






32. Potentially retrievable data residue that remains following intended erasure of data.






33. People who interact with assets






34. Narrow scope examination of a system






35. Of a system without prior knowledge by the tester or the tested






36. A subnetwork with storage devices servicing all servers on the attached network.






37. Object reuse protection and auditing






38. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






39. For PKI - decertify an entities certificate






40. Code making






41. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






42. An image compression standard for photographs






43. Intellectual property protection for an confidential and critical process






44. OOP concept of an object's abilities - what it does






45. Something that happened






46. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






47. Evidence must be: admissible - authentic - complete - accurate - and convincing






48. Representatives from each functional area or department get together and walk through the plan from beginning to end.






49. System mediation of access with the focus on the context of the request






50. The chance that something negative will occur