Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Review of data






2. The managerial approval to operate a system based upon knowledge of risk to operate






3. To stop damage from spreading






4. Control category - more than one control on a single asset






5. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






6. Intellectual property protection for an confidential and critical process






7. Sudden rise in voltage in the power supply.






8. Written step-by-step actions






9. Independent malware that requires user interaction to execute






10. Renders the file inaccessible to the operating system - available to reuse for data storage.






11. The problems solving state - the opposite of supervisor mode






12. A technology that reduces the size of a file.






13. Real-time data backup ( Data Mirroring)






14. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






15. A temporary public file to inform others of a compromised digital certificate






16. Joining two pieces of text






17. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






18. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






19. Process whereby data is removed from active files and other data storage structures






20. Unchecked data which spills into another location in memory






21. Some systems are actually run at the alternate site






22. Sphere of influence






23. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






24. The study of cryptography and cryptanalysis






25. System of law based upon precedence - with major divisions of criminal - tort - and administrative






26. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






27. An unintended communication path






28. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






29. To load the first piece of software that starts a computer.






30. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






31. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






32. Guidelines within an organization that control the rules and configurations of an IDS






33. Controls for logging and alerting






34. A form of data hiding which protects running threads of execution from using each other's memory






35. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






36. Something that happened






37. Tool which mediates access






38. For PKI - to store another copy of a key






39. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






40. Control category- to restore to a previous state by removing the adversary and or the results of their actions






41. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






42. Is secondhand and usually not admissible in court






43. A hash that has been further encrypted with a symmetric algorithm






44. Inappropriate data






45. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






46. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






47. Communicate to stakeholders






48. The chance that something negative will occur






49. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






50. Uncheck data input which results in redirection