Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Joining two pieces of text






2. For PKI - decertify an entities certificate






3. High level design or model with a goal of consistency - integrity - and balance






4. Individuals and departments responsible for the storage and safeguarding of computerized data.






5. Narrow scope examination of a system






6. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






7. A type a computer memory that temporarily stores frequently used information for quick access.






8. Someone who want to know how something works - typically by taking it apart






9. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






10. Wrong against society






11. Memory management technique which allows subjects to use the same resource






12. Weak evidence






13. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






14. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






15. A collection of information designed to reduce duplication and increase integrity






16. Creation distribution update and deletion






17. RADIUS - TACACS+ - Diameter






18. Record history of incident






19. Can be statistical (monitor behavior) or signature based (watch for known attacks)






20. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






21. Third party processes used to organize the implementation of an architecture






22. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






23. A disturbance that degrades performance of electronic devices and electronic communications.






24. A telephone exchange for a specific office or business.






25. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






26. A temporary public file to inform others of a compromised digital certificate






27. OOP concept of a taking attributes from the original or parent






28. The core logic engine of an operating system which almost never changes






29. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






30. A form of data hiding which protects running threads of execution from using each other's memory






31. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






32. Trading one for another






33. Subset of operating systems components dedicated to protection mechanisms






34. Moving the alphabet intact a certain number spaces






35. Controls for termination of attempt to access object






36. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






37. Two certificate authorities that trust each other






38. A backup type which creates a complete copy






39. A planned or unplanned interruption in system availability.






40. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






41. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






42. Business and technical process of applying security software updates in a regulated periodic way






43. Evidence must be: admissible - authentic - complete - accurate - and convincing






44. System mediation of access with the focus on the context of the request






45. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






46. Recognition of an individual's assertion of identity.






47. To know more than one job






48. A layer 2 device that used to connect two or more network segments and regulate traffic.






49. A device that provides the functions of both a bridge and a router.






50. The one person responsible for data - its classification and control setting