Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Reprogrammable basic startup instructions






2. To evaluate the current situation and make basic decisions as to what to do






3. Location to perform the business function






4. False memory reference






5. To segregate for the purposes of labeling






6. Requirement of access to data for a clearly defined purpose






7. Converts source code to an executable






8. An encryption method that has a key as long as the message






9. A signal suggesting a system has been or is being attacked.






10. Regular operations are stopped and where processing is moved to the alternate site.






11. Key






12. A type of multitasking that allows for more even distribution of computing time among competing request






13. A secure connection to another network.






14. Lower frequency noise






15. Intellectual property protection for an invention






16. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






17. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






18. Memory - RAM






19. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






20. Subject based description of a system or a collection of resources






21. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






22. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






23. Line by line translation from a high level language to machine code






24. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy






25. A set of laws that the organization agrees to be bound by






26. To execute more than one instruction at an instant in time






27. Is secondhand and usually not admissible in court






28. A test conducted on one or more components of a plan under actual operating conditions.






29. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






30. Maximum tolerance for loss of certain business function - basis of strategy






31. The property that data meet with a priority expectation of quality and that the data can be relied upon.






32. A database that contains the name - type - range of values - source and authorization for access for each data element






33. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






34. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






35. Code breaking - practice of defeating the protective properties of cryptography.






36. A layer 3 device that used to connect two or more network segments and regulate traffic.






37. Unsolicited advertising software






38. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






39. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






40. Sudden rise in voltage in the power supply.






41. Location where coordination and execution of BCP or DRP is directed






42. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






43. A race condition where the security changes during the object's access






44. Natural occurrence in circuits that are in close proximity






45. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






46. Code making






47. Evidence must be: admissible - authentic - complete - accurate - and convincing






48. A distributed system's transaction control that requires updates to complete or rollback






49. An unintended communication path






50. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.