Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Policy or stated actions






2. Consume resources to a point of exhaustion - loss of availability






3. A description of a database






4. Record history of incident






5. A physical enclosure for verifying identity before entry to a facility






6. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






7. Disruption of operation of an electronic device due to a competing electromagnetic field.






8. Memory - RAM






9. Actions measured against either a policy or what a reasonable person would do






10. Control category - more than one control on a single asset






11. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






12. Renders the record inaccessible to the database management system






13. Induces a crime - tricks a person - and is illegal






14. A record that must be preserved and available for retrieval if needed.






15. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






16. Fault tolerance for power






17. A software design technique for abstraction of a process






18. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






19. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






20. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






21. A mobilized resource purchased or contracted for the purpose of business recovery.






22. One way encryption






23. A world-wide wireless technology






24. Indivisible - data field must contain only one value that either all transactions take place or none do






25. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






26. Unauthorized wireless network access device.






27. Control category- to give instructions or inform






28. A back up type - where the organization has excess capacity in another location.






29. Most granular organization of controls






30. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






31. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






32. Hitting a filed down key in a lock with a hammer to open without real key






33. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






34. Representatives from each functional area or department get together and walk through the plan from beginning to end.






35. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






36. Natural occurrence in circuits that are in close proximity






37. The core of a computer that calculates






38. An asymmetric cryptography mechanism that provides authentication.






39. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






40. Physical description on the exterior of an object that communicates the existence of a label






41. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






42. A database backup type which records at the transaction level






43. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






44. OOP concept of a class's details to be hidden from object






45. Interception of a communication session by an attacker.






46. Reprogrammable basic startup instructions






47. A group or network of honeypots






48. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






49. A risk assessment method - measurable real money cost






50. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive