Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The connection between a wireless and wired network.






2. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






3. Location to perform the business function






4. An encryption method that has a key as long as the message






5. Power surge






6. To segregate for the purposes of labeling






7. Recovery alternative which includes cold site and some equipment and infrastructure is available






8. System of law based upon precedence - with major divisions of criminal - tort - and administrative






9. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






10. Record history of incident






11. People protect their domain






12. Less granular organization of controls -






13. Intermediate level - pertaining to planning






14. Mathematical function that determines the cryptographic operations






15. Pertaining to law - accepted by a court






16. An alert or alarm that is triggered when no actual attack has taken place






17. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






18. Code making






19. A database backup type which records at the transaction level






20. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






21. A description of a database






22. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






23. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






24. A unit of execution






25. Pertaining to law - lending it self to one side of an argument






26. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






27. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






28. A record that must be preserved and available for retrieval if needed.






29. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






30. Converts a high level language into machine language






31. The guardian of asset(s) - a maintenance activity






32. Try a list of words in passwords or encryption keys






33. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






34. Is secondhand and usually not admissible in court






35. Event(s) that cause harm






36. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






37. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






38. Subset of operating systems components dedicated to protection mechanisms






39. An individuals conduct that violates government laws developed to protect the public






40. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






41. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






42. A temporary public file to inform others of a compromised digital certificate






43. Malware that subverts the detective controls of an operating system






44. An availability attack - to consume resources to the point of exhaustion






45. An event which stops business from continuing.






46. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






47. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






48. Line by line translation from a high level language to machine code






49. Hiding the fact that communication has occurred






50. A set of laws that the organization agrees to be bound by






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests