Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides a physical cross connect point for devices.






2. A backup type - for databases at a point in time






3. A condition in which neither party is willing to stop their activity for the other to complete






4. Event(s) that cause harm






5. To segregate for the purposes of labeling






6. Initial surge of current






7. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






8. The principles a person sets for themselves to follow






9. A backup of data located where staff can gain access immediately






10. Uncleared buffers or media






11. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






12. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






13. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






14. A programming design concept which abstracts one set of functions from another in a serialized fashion






15. A template for the designing the architecture






16. The first rating that requires security labels






17. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






18. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






19. Searching for wireless networks in a moving car.






20. Location to perform the business function






21. The core of a computer that calculates






22. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






23. Unused storage capacity






24. Review of data






25. Threats x Vulnerability x Asset Value = Total Risk






26. A layer 3 device that used to connect two or more network segments and regulate traffic.






27. A disturbance that degrades performance of electronic devices and electronic communications.






28. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






29. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






30. One way encryption






31. Natural or human-readable form of message






32. False memory reference






33. Intellectual property protection for an invention






34. Part of a transaction control for a database which informs the database of the last recorded transaction






35. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






36. Highest level of authority at EOC with knowledge of the business process and the resources available






37. Reduction of voltage by the utility company for a prolonged period of time






38. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






39. Joining two pieces of text






40. The one person responsible for data - its classification and control setting






41. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






42. Consume resources to a point of exhaustion - loss of availability






43. A description of a database






44. Interception of a communication session by an attacker.






45. Using many alphabets






46. Define the way in which the organization operates.






47. Moving letters around






48. A trusted issuer of digital certificates






49. A layer 2 device that used to connect two or more network segments and regulate traffic.






50. A control before attack