Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






2. An individuals conduct that violates government laws developed to protect the public






3. Physical description on the exterior of an object that communicates the existence of a label






4. Pertaining to law - lending it self to one side of an argument






5. Using many alphabets






6. Process whereby data is removed from active files and other data storage structures






7. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






8. Induces a crime - tricks a person - and is illegal






9. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






10. Most granular organization of controls






11. To move from location to location - keeping the same function






12. Someone who want to know how something works - typically by taking it apart






13. To know more than one job






14. Record of system activity - which provides for monitoring and detection.






15. Memory management technique which allows data to be moved from one memory address to another






16. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






17. Objects or programming that looks the different but act same






18. Eavesdropping on network communications by a third party.






19. Is secondhand and usually not admissible in court






20. Control category- to give instructions or inform






21. Indivisible - data field must contain only one value that either all transactions take place or none do






22. The core logic engine of an operating system which almost never changes






23. Alerts personnel to the presence of a fire






24. Pertaining to law - accepted by a court






25. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






26. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.






27. Less granular organization of controls -






28. Moving letters around






29. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






30. Real-time - automatic and transparent backup of data.






31. Renders the record inaccessible to the database management system






32. Transaction controls for a database - a return to a previous state






33. Information about a particular data set






34. One entity with two competing allegiances






35. Control type- that is communication based - typically written or oral






36. Recording activities at the keyboard level






37. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






38. Can be statistical (monitor behavior) or signature based (watch for known attacks)






39. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






40. Consume resources to a point of exhaustion - loss of availability






41. A record that must be preserved and available for retrieval if needed.






42. The chance that something negative will occur






43. Forging of an IP address.






44. A set of laws that the organization agrees to be bound by






45. Object reuse protection and auditing






46. Two certificate authorities that trust each other






47. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






48. Searching for wireless networks in a moving car.






49. Vehicle or tool that exploits a weakness






50. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials