Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A control after attack






2. Written suggestions that direct choice to a few alternatives






3. To reduce sudden rises in current






4. Try a list of words in passwords or encryption keys






5. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






6. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






7. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






8. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






9. A mathematical tool for verifying no unintentional changes have been made






10. A collection of information designed to reduce duplication and increase integrity






11. Joining two pieces of text






12. Final purpose or result






13. Scrambled form of the message or data






14. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






15. Record history of incident






16. Subjects will not interact with each other's objects






17. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






18. System mediation of access with the focus on the context of the request






19. Forging of an IP address.






20. Mitigation of system or component loss or interruption through use of backup capability.






21. Mathematical function that determines the cryptographic operations






22. A unit of execution






23. A layer 3 device that used to connect two or more network segments and regulate traffic.






24. Unsolicited advertising software






25. Pertaining to law - accepted by a court






26. Autonomous malware that requires a flaw in a service






27. A documented battle plan for coordinating response to incidents.






28. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






29. A description of a database






30. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






31. Substitution at the word or phrase level






32. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






33. High level - pertaining to planning






34. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






35. The guardian of asset(s) - a maintenance activity






36. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






37. The partial or full duplication of data from a source database to one or more destination databases.






38. Measures followed to restore critical functions following a security incident.






39. A signal suggesting a system has been or is being attacked.






40. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






41. A system designed to prevent unauthorized access to or from a private network.






42. Object based description of a single resource and the permission each subject






43. Identification and notification of an unauthorized and/or undesired action






44. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






45. Lower frequency noise






46. Searching for wireless networks in a moving car.






47. Location to perform the business function






48. An availability attack - to consume resources to the point of exhaustion






49. Malware that subverts the detective controls of an operating system






50. Subset of operating systems components dedicated to protection mechanisms