Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recovery alternative - a building only with sufficient power - and HVAC






2. Trading one for another






3. Calculation encompassing threats - vulnerabilities and assets






4. The document that defines the resources - actions - tasks and data required to manage the business recovery process in the event of a business interruption within the stated disaster recovery goals.






5. Control category - more than one control on a single asset






6. A technology that reduces the size of a file.






7. Vehicle stopping object






8. Those who initiate the attack






9. More than one process in the middle of executing at a time






10. A group or network of honeypots






11. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






12. Recording activities at the keyboard level






13. Data or interference that can trigger a false positive






14. Periodic - automatic and transparent backup of data in bulk.






15. Interception of a communication session by an attacker.






16. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






17. A race condition where the security changes during the object's access






18. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






19. High level - pertaining to planning






20. Outputs within a given function are the same result






21. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






22. Unsolicited commercial email






23. Evidence must be: admissible - authentic - complete - accurate - and convincing






24. To know more than one job






25. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






26. A form of data hiding which protects running threads of execution from using each other's memory






27. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






28. Is secondhand and usually not admissible in court






29. Control category- to restore to a previous state by removing the adversary and or the results of their actions






30. Prolonged loss of commercial power






31. To stop damage from spreading






32. Objects or programming that looks the different but act same






33. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






34. Claiming another's identity at a physical level






35. Control type- that is communication based - typically written or oral






36. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






37. Induces a crime - tricks a person - and is illegal






38. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






39. A basic level of network access control that is based upon information contained in the IP packet header.






40. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






41. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






42. Renders the record inaccessible to the database management system






43. A physical enclosure for verifying identity before entry to a facility






44. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






45. Substitution at the word or phrase level






46. Third party processes used to organize the implementation of an architecture






47. A collection of information designed to reduce duplication and increase integrity






48. DoS - Spoofing - dictionary - brute force - wardialing






49. Natural occurrence in circuits that are in close proximity






50. A process state - (blocked) needing input before continuing