Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Object reuse protection and auditing






2. Unauthorized access of network devices.






3. People who interact with assets






4. Information about a particular data set






5. Communication of a security incident to stakeholders and data owners.






6. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






7. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






8. An event which stops business from continuing.






9. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






10. The property that data meet with a priority expectation of quality and that the data can be relied upon.






11. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






12. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






13. Collection of data on business functions which determines the strategy of resiliency






14. Some systems are actually run at the alternate site






15. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






16. A control after attack






17. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






18. A physical enclosure for verifying identity before entry to a facility






19. Asymmetric encryption of a hash of message






20. Use of specialized techniques for recovery - authentication - and analysis of electronic data






21. The managerial approval to operate a system based upon knowledge of risk to operate






22. Malware that makes small random changes to many data points






23. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






24. Communicate to stakeholders






25. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






26. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






27. Independent malware that requires user interaction to execute






28. Written suggestions that direct choice to a few alternatives






29. Amount of time for restoring a business process or function to normal operations without major loss






30. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






31. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






32. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






33. Measures followed to restore critical functions following a security incident.






34. A basic level of network access control that is based upon information contained in the IP packet header.






35. Effort/time needed to overcome a protective measure






36. A record that must be preserved and available for retrieval if needed.






37. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






38. Owner directed mediation of access






39. Intellectual property protection for an invention






40. Record history of incident






41. A risk assessment method - intrinsic value






42. Subjects will not interact with each other's objects






43. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






44. Unsolicited commercial email






45. Wrong against society






46. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






47. A backup type - for databases at a point in time






48. A shield against leakage of electromagnetic signals.






49. A process state - to be either be unable to run waiting for an external event or terminated






50. OOP concept of an object at runtime