Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






2. Substitution at the word or phrase level






3. State of computer - to be running a process






4. The property that data meet with a priority expectation of quality and that the data can be relied upon.






5. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






6. To execute more than one instruction at an instant in time






7. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






8. The technical and risk assesment of a system within the context of the operating environment






9. A risk assessment method - measurable real money cost






10. A process state - to be executing a process on the CPU






11. High frequency noise






12. Recording activities at the keyboard level






13. Location where coordination and execution of BCP or DRP is directed






14. The managerial approval to operate a system based upon knowledge of risk to operate






15. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






16. To segregate for the purposes of labeling






17. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






18. Methodical research of an incident with the purpose of finding the root cause






19. A description of a database






20. Planning for the delegation of authority required when decisions must be made without the normal chain of command






21. Record of system activity - which provides for monitoring and detection.






22. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






23. A back up type - where the organization has excess capacity in another location.






24. A device that provides the functions of both a bridge and a router.






25. The partial or full duplication of data from a source database to one or more destination databases.






26. An image compression standard for photographs






27. A mathematical tool for verifying no unintentional changes have been made






28. Moving letters around






29. Encryption system using a pair of mathematically related unequal keys






30. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






31. Use of specialized techniques for recovery - authentication - and analysis of electronic data






32. Intellectual property protection for an invention






33. Program instructions based upon the CPU's specific architecture






34. Highest level of authority at EOC with knowledge of the business process and the resources available






35. A type a computer memory that temporarily stores frequently used information for quick access.






36. Process whereby data is removed from active files and other data storage structures






37. For PKI - to store another copy of a key






38. Deals with discretionary protection






39. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






40. Unsolicited commercial email






41. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






42. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






43. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






44. A programming design concept which abstracts one set of functions from another in a serialized fashion






45. Subject based description of a system or a collection of resources






46. Memory management technique that allows two processes to run concurrently without interaction






47. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






48. Renders the file inaccessible to the operating system - available to reuse for data storage.






49. Mitigation of system or component loss or interruption through use of backup capability.






50. A device that sequentially switches multiple analog inputs to the output.