Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






2. Substitution at the word or phrase level






3. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






4. One way encryption






5. Uses two or more legal systems






6. Subject based description of a system or a collection of resources






7. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






8. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






9. Mathematical function that determines the cryptographic operations






10. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






11. Initial surge of current






12. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






13. Recovery alternative - short-term - high cost movable processing location






14. A risk assessment method - measurable real money cost






15. Control category- to record an adversary's actions






16. A risk assessment method - intrinsic value






17. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






18. Vehicle or tool that exploits a weakness






19. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






20. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






21. Quantity of risk remaining after a control is applied






22. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






23. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






24. System mediation of access with the focus on the context of the request






25. Process of statistically testing a data set for the likelihood of relevant information.






26. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






27. A mail server that improperly allows inbound SMTP connections for domains it does not serve.






28. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






29. Someone who want to know how something works - typically by taking it apart






30. Written step-by-step actions






31. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






32. A electronic attestation of identity by a certificate authority






33. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






34. Forging of an IP address.






35. False memory reference






36. Object based description of a single resource and the permission each subject






37. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






38. OOP concept of a taking attributes from the original or parent






39. High degree of visual control






40. State of computer - to be running a process






41. Converts a high level language into machine language






42. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






43. Recovery alternative - a building only with sufficient power - and HVAC






44. Forgery of the sender's email address in an email header.






45. Individuals and departments responsible for the storage and safeguarding of computerized data.






46. Intellectual property protection for the expression of an idea






47. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






48. Potential danger to information or systems






49. Less granular organization of controls -






50. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.