Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small data files written to a user's hard drive by a web server.






2. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






3. Third party processes used to organize the implementation of an architecture






4. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






5. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






6. People who interact with assets






7. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






8. Part of a transaction control for a database which informs the database of the last recorded transaction






9. Code making






10. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






11. Maximum tolerance for loss of certain business function - basis of strategy






12. Total number of keys available that may be selected by the user of a cryptosystem






13. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






14. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






15. Induces a crime - tricks a person - and is illegal






16. Renders the file inaccessible to the operating system - available to reuse for data storage.






17. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






18. May be responsible for overall recovery of an organization or unit(s).






19. Process of statistically testing a data set for the likelihood of relevant information.






20. Vehicle or tool that exploits a weakness






21. To evaluate the current situation and make basic decisions as to what to do






22. Uncleared buffers or media






23. An encryption method that has a key as long as the message






24. Line by line translation from a high level language to machine code






25. To load the first piece of software that starts a computer.






26. Potentially retrievable data residue that remains following intended erasure of data.






27. Communicate to stakeholders






28. Mediation of covert channels must be addressed






29. Control category- to record an adversary's actions






30. Control category- to discourage an adversary from attempting to access






31. A running key using a random key that is never used again






32. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






33. Uncheck data input which results in redirection






34. A form of data hiding which protects running threads of execution from using each other's memory






35. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy






36. Unsolicited commercial email






37. Object based description of a single resource and the permission each subject






38. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






39. Wrong against society






40. Two different keys decrypt the same cipher text






41. One entity with two competing allegiances






42. The problems solving state - the opposite of supervisor mode






43. Control category - more than one control on a single asset






44. A software design technique for abstraction of a process






45. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






46. A basic level of network access control that is based upon information contained in the IP packet header.






47. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






48. Forging of an IP address.






49. Mathematical function that determines the cryptographic operations






50. Return to a normal state