Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Reprogrammable basic startup instructions






2. A mobilized resource purchased or contracted for the purpose of business recovery.






3. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






4. A subnetwork with storage devices servicing all servers on the attached network.






5. Program instructions based upon the CPU's specific architecture






6. A collection of data or information that has a name






7. Recording the Who What When Where How of evidence






8. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






9. A mathematical tool for verifying no unintentional changes have been made






10. Measures followed to restore critical functions following a security incident.






11. A programming device use in development to circumvent controls






12. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






13. Intellectual property protection for an confidential and critical process






14. System of law based upon precedence - with major divisions of criminal - tort - and administrative






15. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






16. Written suggestions that direct choice to a few alternatives






17. A group or network of honeypots






18. Summary of a communication for the purpose of integrity






19. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






20. The partial or full duplication of data from a source database to one or more destination databases.






21. Some systems are actually run at the alternate site






22. OOP concept of a distinct copy of the class






23. A control before attack






24. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






25. With enough computing power trying all possible combinations






26. Unauthorized wireless network access device.






27. Code making






28. Quantity of risk remaining after a control is applied






29. Policy or stated actions






30. Security policy - procedures - and compliance enforcement






31. Transaction controls for a database - a return to a previous state






32. Planning for the delegation of authority required when decisions must be made without the normal chain of command






33. Scrambled form of the message or data






34. A software design technique for abstraction of a process






35. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






36. Converts a high level language into machine language






37. A system that enforces an access control policy between two networks.






38. OOP concept of a class's details to be hidden from object






39. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






40. Information about data or records






41. Eight bits.






42. A description of a database






43. The core logic engine of an operating system which almost never changes






44. A process state - to be either be unable to run waiting for an external event or terminated






45. Pertaining to law - verified as real






46. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






47. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






48. Process of statistically testing a data set for the likelihood of relevant information.






49. To segregate for the purposes of labeling






50. Malware that makes many small changes over time to a single data point or system