Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






2. Information about a particular data set






3. Record of system activity - which provides for monitoring and detection.






4. With enough computing power trying all possible combinations






5. Effort/time needed to overcome a protective measure






6. A state for operating system tasks only






7. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






8. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






9. Creation distribution update and deletion






10. Deals with discretionary protection






11. An encryption method that has a key as long as the message






12. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






13. Some systems are actually run at the alternate site






14. Use of specialized techniques for recovery - authentication - and analysis of electronic data






15. Power surge






16. Physical description on the exterior of an object that communicates the existence of a label






17. Trading one for another






18. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






19. Try a list of words in passwords or encryption keys






20. Narrow scope examination of a system






21. Review of data






22. Descrambling the encrypted message with the corresponding key






23. A documented battle plan for coordinating response to incidents.






24. Subjects will not interact with each other's objects






25. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






26. Control category- to restore to a previous state by removing the adversary and or the results of their actions






27. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






28. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






29. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






30. Measures followed to restore critical functions following a security incident.






31. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






32. A record that must be preserved and available for retrieval if needed.






33. A control after attack






34. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






35. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






36. Memory management technique that allows two processes to run concurrently without interaction






37. Summary of a communication for the purpose of integrity






38. Impossibility of denying authenticity and identity






39. A electronic attestation of identity by a certificate authority






40. A failure of an IDS to detect an actual attack






41. Code making






42. A mobilized resource purchased or contracted for the purpose of business recovery.






43. The technical and risk assesment of a system within the context of the operating environment






44. Wrong against society






45. To break a business process into separate functions and assign to different people






46. A perpetrator leaves something behind or takes something with them at the scene of a crime


47. Recognition of an individual's assertion of identity.






48. Part of a transaction control for a database which informs the database of the last recorded transaction






49. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






50. A BCP testing type - a test that answers the question: Can the organization replicate the business process?