Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






2. Information about a particular data set






3. Subjects will not interact with each other's objects






4. Induces a crime - tricks a person - and is illegal






5. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






6. Return to a normal state






7. The first rating that requires security labels






8. A protocol for the efficient transmission of voice over the Internet






9. A set of laws that the organization agrees to be bound by






10. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






11. A database that contains the name - type - range of values - source and authorization for access for each data element






12. Memory - RAM






13. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.






14. OOP concept of a distinct copy of the class






15. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






16. Object based description of a single resource and the permission each subject






17. To load the first piece of software that starts a computer.






18. A basic level of network access control that is based upon information contained in the IP packet header.






19. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






20. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






21. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






22. Deals with discretionary protection






23. A unit of execution






24. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






25. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






26. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






27. Less granular organization of controls -






28. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






29. Mitigation of system or component loss or interruption through use of backup capability.






30. Recovery alternative which outsources a business function at a cost






31. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






32. OOP concept of a template that consist of attributes and behaviors






33. A covert storage channel on the file attribute






34. Lower frequency noise






35. For PKI - to have more than one person in charge of a sensitive function






36. To execute more than one instruction at an instant in time






37. An asymmetric cryptography mechanism that provides authentication.






38. Used to code/decode a digital data stream.






39. An alert or alarm that is triggered when no actual attack has taken place






40. A mobilized resource purchased or contracted for the purpose of business recovery.






41. What is will remain - persistence






42. Natural occurrence in circuits that are in close proximity






43. Maximum tolerance for loss of certain business function - basis of strategy






44. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination






45. Unused storage capacity






46. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






47. Mathematical function that determines the cryptographic operations






48. Requirement to take time off






49. Control category- to record an adversary's actions






50. Control category - more than one control on a single asset