Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides a physical cross connect point for devices.






2. Uncleared buffers or media






3. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






4. DoS - Spoofing - dictionary - brute force - wardialing






5. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






6. Intellectual property protection for marketing efforts






7. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






8. OOP concept of a distinct copy of the class






9. A description of a database






10. Joining two pieces of text






11. Planning for the delegation of authority required when decisions must be made without the normal chain of command






12. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






13. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






14. Mathematical function that determines the cryptographic operations






15. A program with an inappropriate second purpose






16. Momentary loss of power






17. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






18. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






19. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






20. Quantity of risk remaining after a control is applied






21. Maximum tolerance for loss of certain business function - basis of strategy






22. Review of data






23. Reduction of voltage by the utility company for a prolonged period of time






24. Mitigate damage by isolating compromised systems from the network.






25. A programming device use in development to circumvent controls






26. Data or interference that can trigger a false positive






27. The principles a person sets for themselves to follow






28. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






29. A state where two subjects can access the same object without proper mediation






30. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






31. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






32. Recovery alternative which includes cold site and some equipment and infrastructure is available






33. Creation distribution update and deletion






34. Record of system activity - which provides for monitoring and detection.






35. Requirement to take time off






36. Most granular organization of controls






37. A unit of execution






38. A running key using a random key that is never used again






39. Induces a crime - tricks a person - and is illegal






40. Encryption system using a pair of mathematically related unequal keys






41. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.






42. To create a copy of data as a precaution against the loss or damage of the original data.






43. To break a business process into separate functions and assign to different people






44. One of the key benefits of a network is the ability to share files stored on the server among several users.






45. A temporary public file to inform others of a compromised digital certificate






46. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






47. OOP concept of a template that consist of attributes and behaviors






48. A design methodology which executes in a linear one way fashion






49. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






50. The event signaling an IDS to produce an alarm when no attack has taken place