Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One of the key benefits of a network is the ability to share files stored on the server among several users.






2. Amount of time for restoring a business process or function to normal operations without major loss






3. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






4. The one person responsible for data - its classification and control setting






5. Natural or human-readable form of message






6. Momentary loss of power






7. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






8. Total number of keys available that may be selected by the user of a cryptosystem






9. Unsolicited commercial email






10. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






11. One entity with two competing allegiances






12. A race condition where the security changes during the object's access






13. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






14. A copy of transaction data - designed for querying and reporting






15. System mediation of access with the focus on the context of the request






16. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






17. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






18. False memory reference






19. A process state - (blocked) needing input before continuing






20. Pertaining to law - verified as real






21. A running key using a random key that is never used again






22. Periodic - automatic and transparent backup of data in bulk.






23. Identification and notification of an unauthorized and/or undesired action






24. Intellectual property protection for an invention






25. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






26. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






27. Requirement of access to data for a clearly defined purpose






28. Vehicle or tool that exploits a weakness






29. Low level - pertaining to planning






30. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






31. High frequency noise






32. A system that enforces an access control policy between two networks.






33. Mitigation of system or component loss or interruption through use of backup capability.






34. A Trojan horse with the express underlying purpose of controlling host from a distance






35. Uncheck data input which results in redirection






36. Recovery alternative - short-term - high cost movable processing location






37. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






38. Provides a physical cross connect point for devices.






39. Intellectual property protection for an confidential and critical process






40. Threats x Vulnerability x Asset Value = Total Risk






41. Recovery alternative - a building only with sufficient power - and HVAC






42. Written internalized or nationalized norms that are internal to an organization






43. A covert storage channel on the file attribute






44. Eavesdropping on network communications by a third party.






45. Narrow scope examination of a system






46. Return to a normal state






47. Prolonged loss of commercial power






48. Just enough access to do the job






49. Key






50. OOP concept of a distinct copy of the class