Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






2. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






3. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






4. More than one processor sharing same memory - also know as parallel systems






5. The one person responsible for data - its classification and control setting






6. A system designed to prevent unauthorized access to or from a private network.






7. A programming design concept which abstracts one set of functions from another in a serialized fashion






8. To create a copy of data as a precaution against the loss or damage of the original data.






9. Information about data or records






10. An individuals conduct that violates government laws developed to protect the public






11. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






12. Most granular organization of controls






13. Individuals and departments responsible for the storage and safeguarding of computerized data.






14. An image compression standard for photographs






15. A device that converts between digital and analog representation of data.






16. Planning for the delegation of authority required when decisions must be made without the normal chain of command






17. The managerial approval to operate a system based upon knowledge of risk to operate






18. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






19. Objects or programming that looks the different but act same






20. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






21. An asymmetric cryptography mechanism that provides authentication.






22. Sphere of influence






23. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






24. To collect many small pieces of data






25. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






26. Someone who wants to cause harm






27. Mathematical function that determines the cryptographic operations






28. Part of a transaction control for a database which informs the database of the last recorded transaction






29. Unauthorized wireless network access device.






30. To segregate for the purposes of labeling






31. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






32. Lower frequency noise






33. The partial or full duplication of data from a source database to one or more destination databases.






34. Specific format of technical and physical controls that support the chosen framework and the architecture






35. Memory management technique which allows data to be moved from one memory address to another






36. Reduction of voltage by the utility company for a prolonged period of time






37. More than one CPU on a single board






38. A running key using a random key that is never used again






39. To assert or claim credentialing to an authentication system






40. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






41. To move from location to location - keeping the same function






42. Communicate to stakeholders






43. A legal enforceable agreement between: two people - two organizations - a person and an organization.






44. OOP concept of a class's details to be hidden from object






45. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






46. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






47. Is secondhand and usually not admissible in court






48. A database that contains the name - type - range of values - source and authorization for access for each data element






49. Unsolicited advertising software






50. Moving the alphabet intact a certain number spaces