Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Calculation encompassing threats - vulnerabilities and assets






2. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






3. Property that data is represented in the same manner at all times






4. Encryption system using shared key/private key/single key/secret key






5. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






6. Object based description of a system or a collection of resources






7. Malware that subverts the detective controls of an operating system






8. OOP concept of a distinct copy of the class






9. A control after attack






10. To create a copy of data as a precaution against the loss or damage of the original data.






11. Lower frequency noise






12. Line noise that is superimposed on the supply circuit.






13. Subjects will not interact with each other's objects






14. The collection and summation of risk data relating to a particular asset and controls for that asset






15. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






16. Encryption system using a pair of mathematically related unequal keys






17. Small data files written to a user's hard drive by a web server.






18. Object reuse protection and auditing






19. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






20. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






21. Intellectual property protection for an invention






22. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






23. A backup of data located where staff can gain access immediately






24. Identification and notification of an unauthorized and/or undesired action






25. The hard drive






26. For PKI - to have more than one person in charge of a sensitive function






27. A process state - (blocked) needing input before continuing






28. Dedicated fast memory located on the same board as the CPU






29. To jump to a conclusion






30. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






31. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






32. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






33. Data or interference that can trigger a false positive






34. Prolonged loss of commercial power






35. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






36. Short period of low voltage.






37. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






38. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






39. A state where two subjects can access the same object without proper mediation






40. To reduce sudden rises in current






41. Two certificate authorities that trust each other






42. Planning with a goal of returning to the normal business function






43. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






44. Natural or human-readable form of message






45. Written step-by-step actions






46. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






47. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






48. Recovery alternative - everything needed for the business function - except people and last backup






49. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






50. Substitution at the word or phrase level