Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






2. A risk assessment method - measurable real money cost






3. To set the clearance of a subject or the classification of an object






4. Responsibility for actions






5. Specific format of technical and physical controls that support the chosen framework and the architecture






6. Individuals and departments responsible for the storage and safeguarding of computerized data.






7. Unsolicited advertising software






8. High degree of visual control






9. Consume resources to a point of exhaustion - loss of availability






10. Recovery alternative which includes cold site and some equipment and infrastructure is available






11. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






12. A distributed system's transaction control that requires updates to complete or rollback






13. Memory management technique that allows two processes to run concurrently without interaction






14. Try a list of words in passwords or encryption keys






15. OOP concept of a class's details to be hidden from object






16. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






17. A legal enforceable agreement between: two people - two organizations - a person and an organization.






18. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






19. An event which stops business from continuing.






20. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






21. The technical and risk assesment of a system within the context of the operating environment






22. Information about a particular data set






23. Firewalls - encryption - and access control lists






24. For PKI - decertify an entities certificate






25. Recording activities at the keyboard level






26. All of the protection mechanism in a computer system






27. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






28. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






29. A electronic attestation of identity by a certificate authority






30. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






31. Using many alphabets






32. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






33. Deals with discretionary protection






34. Uncheck data input which results in redirection






35. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






36. The chance that something negative will occur






37. Measures followed to restore critical functions following a security incident.






38. Total number of keys available that may be selected by the user of a cryptosystem






39. A template for the designing the architecture






40. The partial or full duplication of data from a source database to one or more destination databases.






41. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






42. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






43. Weakness or flaw in an asset






44. Property that data is represented in the same manner at all times






45. Two certificate authorities that trust each other






46. Objects or programming that looks the different but act same






47. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






48. Sudden rise in voltage in the power supply.






49. Tool which mediates access






50. Act of luring an intruder and is legal.