Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The one person responsible for data - its classification and control setting






2. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






3. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






4. Hiding the fact that communication has occurred






5. Unauthorized wireless network access device.






6. Indivisible - data field must contain only one value that either all transactions take place or none do






7. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






8. A type of multitasking that allows for more even distribution of computing time among competing request






9. Potential danger to information or systems






10. Information about a particular data set






11. Policy or stated actions






12. Highest level of authority at EOC with knowledge of the business process and the resources available






13. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






14. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






15. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






16. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






17. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






18. Small data files written to a user's hard drive by a web server.






19. A unit of execution






20. Deals with discretionary protection






21. Collection of data on business functions which determines the strategy of resiliency






22. An administrative unit or a group of objects and subjects controlled by one reference monitor






23. Act of scrambling the cleartext message by using a key.






24. Impossibility of denying authenticity and identity






25. A copy of transaction data - designed for querying and reporting






26. Total number of keys available that may be selected by the user of a cryptosystem






27. A temporary public file to inform others of a compromised digital certificate






28. A world-wide wireless technology






29. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






30. A set of laws that the organization agrees to be bound by






31. Scrambled form of the message or data






32. Record of system activity - which provides for monitoring and detection.






33. The principles a person sets for themselves to follow






34. To collect many small pieces of data






35. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






36. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






37. Information about data or records






38. Consume resources to a point of exhaustion - loss of availability






39. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






40. A system that enforces an access control policy between two networks.






41. Business and technical process of applying security software updates in a regulated periodic way






42. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






43. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






44. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






45. Potentially compromising leakage of electrical or acoustical signals.






46. Written suggestions that direct choice to a few alternatives






47. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






48. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






49. Inference about encrypted communications






50. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.