Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recovery alternative - complete duplication of services including personnel






2. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






3. A design methodology which addresses risk early and often






4. Organized group of compromised computers






5. A type a computer memory that temporarily stores frequently used information for quick access.






6. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






7. Record history of incident






8. An administrative unit or a group of objects and subjects controlled by one reference monitor






9. Moving the alphabet intact a certain number spaces






10. A program that waits for a condition or time to occur that executes an inappropriate activity






11. Eight bits.






12. Specific format of technical and physical controls that support the chosen framework and the architecture






13. Key






14. Code making






15. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






16. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






17. Can be statistical (monitor behavior) or signature based (watch for known attacks)






18. Encryption system using a pair of mathematically related unequal keys






19. Reduction of voltage by the utility company for a prolonged period of time






20. The chance that something negative will occur






21. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






22. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






23. Power surge






24. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






25. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






26. Total number of keys available that may be selected by the user of a cryptosystem






27. Written suggestions that direct choice to a few alternatives






28. Control category- to record an adversary's actions






29. To know more than one job






30. Guidelines within an organization that control the rules and configurations of an IDS






31. Employment education done once per position or at significant change of function






32. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






33. An image compression standard for photographs






34. Hiding the fact that communication has occurred






35. Converts a high level language into machine language






36. A temporary public file to inform others of a compromised digital certificate






37. Physical description on the exterior of an object that communicates the existence of a label






38. A design methodology which executes in a linear one way fashion






39. A device that provides the functions of both a bridge and a router.






40. Natural or human-readable form of message






41. Potentially compromising leakage of electrical or acoustical signals.






42. OOP concept of a class's details to be hidden from object






43. A planned or unplanned interruption in system availability.






44. Return to a normal state






45. To assert or claim credentialing to an authentication system






46. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






47. A risk assessment method - intrinsic value






48. The one person responsible for data - its classification and control setting






49. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






50. A programming design concept which abstracts one set of functions from another in a serialized fashion