Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A electronic attestation of identity by a certificate authority






2. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






3. OOP concept of a class's details to be hidden from object






4. Potentially compromising leakage of electrical or acoustical signals.






5. A description of a database






6. Someone who wants to cause harm






7. Abstract and mathematical in nature - defining all possible states - transitions and operations






8. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






9. Narrow scope examination of a system






10. Review of data






11. A Trojan horse with the express underlying purpose of controlling host from a distance






12. Just enough access to do the job






13. High frequency noise






14. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






15. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






16. Planning for the delegation of authority required when decisions must be made without the normal chain of command






17. Using small special tools all tumblers of the lock are aligned - opening the door






18. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






19. Control category- to give instructions or inform






20. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






21. To stop damage from spreading






22. Statistical probabilities of a collision are more likely than one thinks






23. A race condition where the security changes during the object's access






24. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






25. Intellectual property protection for an invention






26. Alerts personnel to the presence of a fire






27. An administrative unit or a group of objects and subjects controlled by one reference monitor






28. Fault tolerance for power






29. Actions measured against either a policy or what a reasonable person would do






30. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






31. Sphere of influence






32. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






33. Control category- to record an adversary's actions






34. A computer designed for the purpose of studying adversaries






35. Provides a physical cross connect point for devices.






36. People protect their domain






37. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






38. An asymmetric cryptography mechanism that provides authentication.






39. A technology that reduces the size of a file.






40. Uses two or more legal systems






41. A protocol for the efficient transmission of voice over the Internet






42. A copy of transaction data - designed for querying and reporting






43. To reduce sudden rises in current






44. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






45. Data or interference that can trigger a false positive






46. An attack involving the hijacking of a TCP session by predicting a sequence number.






47. Uncleared buffers or media






48. For PKI - to store another copy of a key






49. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






50. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.