Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A race condition where the security changes during the object's access






2. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






3. Alerts personnel to the presence of a fire






4. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






5. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






6. A process state - to be either be unable to run waiting for an external event or terminated






7. Memory management technique that allows two processes to run concurrently without interaction






8. To start business continuity processes






9. A failure of an IDS to detect an actual attack






10. Data or interference that can trigger a false positive






11. Pertaining to law - accepted by a court






12. Trading one for another






13. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






14. A type of multitasking that allows for more even distribution of computing time among competing request






15. To stop damage from spreading






16. Real-time - automatic and transparent backup of data.






17. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






18. An unintended communication path






19. Guidelines within an organization that control the rules and configurations of an IDS






20. Forgery of the sender's email address in an email header.






21. A system that enforces an access control policy between two networks.






22. Calculation encompassing threats - vulnerabilities and assets






23. An administrative unit or a group of objects and subjects controlled by one reference monitor






24. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






25. Eavesdropping on network communications by a third party.






26. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






27. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






28. Security policy - procedures - and compliance enforcement






29. A Denial of Service attack that floods the target system with connection requests that are not finalized.






30. Key






31. Process whereby data is removed from active files and other data storage structures






32. A record that must be preserved and available for retrieval if needed.






33. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






34. A backup type which creates a complete copy






35. Long term knowledge building






36. Return to a normal state






37. Provides a physical cross connect point for devices.






38. The managerial approval to operate a system based upon knowledge of risk to operate






39. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






40. Induces a crime - tricks a person - and is illegal






41. A design methodology which executes in a linear one way fashion






42. Evidence must be: admissible - authentic - complete - accurate - and convincing






43. Record of system activity - which provides for monitoring and detection.






44. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






45. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






46. To smooth out reductions or increases in power






47. Small data warehouse






48. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






49. Descrambling the encrypted message with the corresponding key






50. Of a system without prior knowledge by the tester or the tested