Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Real-time - automatic and transparent backup of data.






2. A telephone exchange for a specific office or business.






3. Natural occurrence in circuits that are in close proximity






4. Mediation of subject and object interactions






5. Written internalized or nationalized norms that are internal to an organization






6. System of law based upon precedence - with major divisions of criminal - tort - and administrative






7. Control category- to restore to a previous state by removing the adversary and or the results of their actions






8. High level design or model with a goal of consistency - integrity - and balance






9. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






10. A program that waits for a condition or time to occur that executes an inappropriate activity






11. Memory - RAM






12. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






13. A database backup type which records at the transaction level






14. A choice in risk management - to convince another to assume risk - typically by payment






15. Information about a particular data set






16. Written suggestions that direct choice to a few alternatives






17. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






18. For PKI - to have more than one person in charge of a sensitive function






19. An availability attack - to consume resources to the point of exhaustion from multiple vectors






20. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






21. Tool which mediates access






22. To stop damage from spreading






23. DoS - Spoofing - dictionary - brute force - wardialing






24. OOP concept of an object at runtime






25. Memory management technique which allows subjects to use the same resource






26. Can be statistical (monitor behavior) or signature based (watch for known attacks)






27. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






28. A legal enforceable agreement between: two people - two organizations - a person and an organization.






29. For PKI - to store another copy of a key






30. A layer 2 device that used to connect two network segments and regulate traffic.






31. Object based description of a single resource and the permission each subject






32. Something that happened






33. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






34. Sudden rise in voltage in the power supply.






35. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






36. Pertaining to law - verified as real






37. OOP concept of a class's details to be hidden from object






38. Joining two pieces of text






39. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






40. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






41. Mathematical function that determines the cryptographic operations






42. Review of data






43. Control category- to discourage an adversary from attempting to access






44. Calculation encompassing threats - vulnerabilities and assets






45. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware






46. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






47. Using small special tools all tumblers of the lock are aligned - opening the door






48. A type a computer memory that temporarily stores frequently used information for quick access.






49. An individuals conduct that violates government laws developed to protect the public






50. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).