Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pertaining to law - lending it self to one side of an argument






2. Abstract and mathematical in nature - defining all possible states - transitions and operations






3. Third party processes used to organize the implementation of an architecture






4. Communication of a security incident to stakeholders and data owners.






5. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






6. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






7. Hardware or software that is part of a larger system






8. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






9. To reduce fire






10. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






11. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






12. An asymmetric cryptography mechanism that provides authentication.






13. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






14. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






15. Recovery alternative - short-term - high cost movable processing location






16. Responsibility of a user for the actions taken by their account which requires unique identification






17. Two different keys decrypt the same cipher text






18. Most granular organization of controls






19. A basic level of network access control that is based upon information contained in the IP packet header.






20. Natural or human-readable form of message






21. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






22. Something that happened






23. A backup of data located where staff can gain access immediately






24. Inference about encrypted communications






25. Unsolicited advertising software






26. Try a list of words in passwords or encryption keys






27. Alerts personnel to the presence of a fire






28. An image compression standard for photographs






29. Mitigate damage by isolating compromised systems from the network.






30. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






31. Eight bits.






32. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






33. The chance that something negative will occur






34. Subjects will not interact with each other's objects






35. To create a copy of data as a precaution against the loss or damage of the original data.






36. Calculation encompassing threats - vulnerabilities and assets






37. A electronic attestation of identity by a certificate authority






38. The problems solving state - the opposite of supervisor mode






39. A design methodology which executes in a linear one way fashion






40. A database that contains the name - type - range of values - source and authorization for access for each data element






41. Recovery alternative - complete duplication of services including personnel






42. Ertaining to a number system that has just two unique digits.






43. The core of a computer that calculates






44. A race condition where the security changes during the object's access






45. Specific format of technical and physical controls that support the chosen framework and the architecture






46. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






47. Data or interference that can trigger a false positive






48. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






49. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






50. Pertaining to law - verified as real