Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Deals with discretionary protection






2. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






3. Pertaining to law - no omissions






4. Wrong against society






5. Just enough access to do the job






6. Recording activities at the keyboard level






7. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






8. A type of attack involving attempted insertion - deletion or altering of data.






9. To smooth out reductions or increases in power






10. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






11. The event signaling an IDS to produce an alarm when no attack has taken place






12. Most granular organization of controls






13. Two certificate authorities that trust each other






14. The core of a computer that calculates






15. To create a copy of data as a precaution against the loss or damage of the original data.






16. A program that waits for a condition or time to occur that executes an inappropriate activity






17. People protect their domain






18. A Trojan horse with the express underlying purpose of controlling host from a distance






19. Firewalls - encryption - and access control lists






20. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






21. A database backup type which records at the transaction level






22. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






23. To move from location to location - keeping the same function






24. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






25. Vehicle or tool that exploits a weakness






26. Pertaining to law - lending it self to one side of an argument






27. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






28. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






29. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






30. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






31. Periodic - automatic and transparent backup of data in bulk.






32. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.






33. A collection of information designed to reduce duplication and increase integrity






34. Forging of an IP address.






35. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






36. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






37. Long term knowledge building






38. Pertaining to law - verified as real






39. Controls deployed to avert unauthorized and/or undesired actions.






40. Uses two or more legal systems






41. Someone who want to know how something works - typically by taking it apart






42. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






43. A back up type - where the organization has excess capacity in another location.






44. For PKI - to have more than one person in charge of a sensitive function






45. Key






46. The problems solving state - the opposite of supervisor mode






47. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






48. The level and label given to an individual for the purpose of compartmentalization






49. A temporary public file to inform others of a compromised digital certificate






50. Pertaining to law - high degree of veracity