Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






2. Joining two pieces of text






3. Used to code/decode a digital data stream.






4. A signal suggesting a system has been or is being attacked.






5. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






6. Code making






7. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






8. A layer 3 device that used to connect two or more network segments and regulate traffic.






9. More than one processor sharing same memory - also know as parallel systems






10. A description of a database






11. A race condition where the security changes during the object's access






12. What is will remain - persistence






13. Pertaining to law - lending it self to one side of an argument






14. Potentially compromising leakage of electrical or acoustical signals.






15. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






16. Pertaining to law - no omissions






17. A protocol for the efficient transmission of voice over the Internet






18. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






19. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






20. A legal enforceable agreement between: two people - two organizations - a person and an organization.






21. For PKI - to have more than one person in charge of a sensitive function






22. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






23. A disturbance that degrades performance of electronic devices and electronic communications.






24. A program with an inappropriate second purpose






25. Reprogrammable basic startup instructions






26. To collect many small pieces of data






27. To reduce fire






28. Potentially retrievable data residue that remains following intended erasure of data.






29. A database backup type which records at the transaction level






30. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






31. A hash that has been further encrypted with a symmetric algorithm






32. Collection of data on business functions which determines the strategy of resiliency






33. Actions measured against either a policy or what a reasonable person would do






34. Memory management technique which allows subjects to use the same resource






35. Malware that makes many small changes over time to a single data point or system






36. Short period of low voltage.






37. Key






38. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






39. The collection and summation of risk data relating to a particular asset and controls for that asset






40. Transaction controls for a database - a return to a previous state






41. Recovery alternative which includes cold site and some equipment and infrastructure is available






42. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






43. Substitution at the word or phrase level






44. High frequency noise






45. For PKI - decertify an entities certificate






46. A choice in risk management - to implement a control that limits or lessens negative effects






47. All of the protection mechanism in a computer system






48. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






49. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






50. Redundant component that provides failover capability in the event of failure or interruption of a primary component.