Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pertaining to law - lending it self to one side of an argument






2. To start business continuity processes






3. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






4. For PKI - to have more than one person in charge of a sensitive function






5. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






6. Communicate to stakeholders






7. A collection of data or information that has a name






8. Interception of a communication session by an attacker.






9. Short period of low voltage.






10. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






11. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






12. A one way - directed graph which indicates confidentiality or integrity flow






13. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






14. Maintenance procedures outline the process for the review and update of business continuity plans.






15. A program with an inappropriate second purpose






16. Converts a high level language into machine language






17. Security policy - procedures - and compliance enforcement






18. Actions measured against either a policy or what a reasonable person would do






19. A race condition where the security changes during the object's access






20. Mitigation of system or component loss or interruption through use of backup capability.






21. Unauthorized wireless network access device.






22. Substitution at the word or phrase level






23. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






24. Using small special tools all tumblers of the lock are aligned - opening the door






25. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






26. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






27. The principles a person sets for themselves to follow






28. To create a copy of data as a precaution against the loss or damage of the original data.






29. Evidence must be: admissible - authentic - complete - accurate - and convincing






30. Intermediate level - pertaining to planning






31. The collection and summation of risk data relating to a particular asset and controls for that asset






32. Trading one for another






33. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






34. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






35. Autonomous malware that requires a flaw in a service






36. Scrambled form of the message or data






37. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






38. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






39. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






40. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






41. Uses two or more legal systems






42. A risk assessment method - measurable real money cost






43. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






44. Recovery alternative - complete duplication of services including personnel






45. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






46. The event signaling an IDS to produce an alarm when no attack has taken place






47. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






48. Effort/time needed to overcome a protective measure






49. Pertaining to law - verified as real






50. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.