Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An event which stops business from continuing.






2. An unintended communication path






3. Uses two or more legal systems






4. Converts a high level language into machine language






5. The core of a computer that calculates






6. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






7. A layer 3 device that used to connect two or more network segments and regulate traffic.






8. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






9. Object reuse protection and auditing






10. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






11. To load the first piece of software that starts a computer.






12. Unauthorized access of network devices.






13. A process state - to be executing a process on the CPU






14. Can be statistical (monitor behavior) or signature based (watch for known attacks)






15. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






16. To know more than one job






17. May be responsible for overall recovery of an organization or unit(s).






18. Real-time - automatic and transparent backup of data.






19. Eight bits.






20. Renders the file inaccessible to the operating system - available to reuse for data storage.






21. A one way - directed graph which indicates confidentiality or integrity flow






22. Final purpose or result






23. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






24. Uncleared buffers or media






25. A description of a database






26. Recording the Who What When Where How of evidence






27. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






28. A choice in risk management - to implement a control that limits or lessens negative effects






29. Mathematical function that determines the cryptographic operations






30. Sudden rise in voltage in the power supply.






31. A telephone exchange for a specific office or business.






32. Power surge






33. Actions measured against either a policy or what a reasonable person would do






34. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






35. A set of laws that the organization agrees to be bound by






36. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






37. Asymmetric encryption of a hash of message






38. Return to a normal state






39. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






40. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






41. Most granular organization of controls






42. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






43. System mediation of access with the focus on the context of the request






44. Hardware or software that is part of a larger system






45. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






46. Unchecked data which spills into another location in memory






47. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.






48. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






49. Subjects will not interact with each other's objects






50. Alerts personnel to the presence of a fire