Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A database backup type which records at the transaction level






2. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






3. Wrong against society






4. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






5. Moving letters around






6. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






7. A copy of transaction data - designed for querying and reporting






8. Threats x Vulnerability x Asset Value = Total Risk






9. More than one CPU on a single board






10. Vehicle or tool that exploits a weakness






11. The first rating that requires security labels






12. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






13. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






14. Something that happened






15. With enough computing power trying all possible combinations






16. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






17. For PKI - decertify an entities certificate






18. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






19. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






20. Sphere of influence






21. Vehicle stopping object






22. A risk assessment method - intrinsic value






23. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware






24. Claiming another's identity at a physical level






25. Eavesdropping on network communications by a third party.






26. People protect their domain






27. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






28. Process of statistically testing a data set for the likelihood of relevant information.






29. Control category- to record an adversary's actions






30. A backup of data located where staff can gain access immediately






31. A risk assessment method - measurable real money cost






32. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






33. What is will remain - persistence






34. Actions measured against either a policy or what a reasonable person would do






35. Hitting a filed down key in a lock with a hammer to open without real key






36. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






37. To move from location to location - keeping the same function






38. Written suggestions that direct choice to a few alternatives






39. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






40. Substitution at the word or phrase level






41. A technology that reduces the size of a file.






42. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






43. A covert storage channel on the file attribute






44. Summary of a communication for the purpose of integrity






45. Collection of data on business functions which determines the strategy of resiliency






46. Evidence must be: admissible - authentic - complete - accurate - and convincing






47. Policy or stated actions






48. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






49. To reduce fire






50. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization