Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






2. With enough computing power trying all possible combinations






3. An asymmetric cryptography mechanism that provides authentication.






4. Fault tolerance for power






5. Two different keys decrypt the same cipher text






6. A computer designed for the purpose of studying adversaries






7. Alerts personnel to the presence of a fire






8. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






9. A state for operating system tasks only






10. Is secondhand and usually not admissible in court






11. Location where coordination and execution of BCP or DRP is directed






12. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






13. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






14. Unused storage capacity






15. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






16. Uncheck data input which results in redirection






17. Renders the record inaccessible to the database management system






18. To set the clearance of a subject or the classification of an object






19. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






20. Evidence must be: admissible - authentic - complete - accurate - and convincing






21. Sudden rise in voltage in the power supply.






22. Return to a normal state






23. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






24. A database that contains the name - type - range of values - source and authorization for access for each data element






25. False memory reference






26. Lower frequency noise






27. A condition in which neither party is willing to stop their activity for the other to complete






28. An image compression standard for photographs






29. The partial or full duplication of data from a source database to one or more destination databases.






30. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.






31. A device that provides the functions of both a bridge and a router.






32. Measures followed to restore critical functions following a security incident.






33. Converts source code to an executable






34. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






35. One entity with two competing allegiances






36. Mediation of covert channels must be addressed






37. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






38. Subset of operating systems components dedicated to protection mechanisms






39. Mitigation of system or component loss or interruption through use of backup capability.






40. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






41. One way encryption






42. Record of system activity - which provides for monitoring and detection.






43. Moving the alphabet intact a certain number spaces






44. Summary of a communication for the purpose of integrity






45. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






46. Less granular organization of controls -






47. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






48. Threats x Vulnerability x Asset Value = Total Risk






49. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






50. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities