Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Guidelines within an organization that control the rules and configurations of an IDS






2. Organized group of compromised computers






3. Evidence must be: admissible - authentic - complete - accurate - and convincing






4. OOP concept of an object's abilities - what it does






5. Record history of incident






6. To create a copy of data as a precaution against the loss or damage of the original data.






7. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






8. An availability attack - to consume resources to the point of exhaustion from multiple vectors






9. Code making






10. Autonomous malware that requires a flaw in a service






11. Control category- to discourage an adversary from attempting to access






12. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






13. Security policy - procedures - and compliance enforcement






14. Sphere of influence






15. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






16. Hiding the fact that communication has occurred






17. Try a list of words in passwords or encryption keys






18. To stop damage from spreading






19. System directed mediation of access with labels






20. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






21. OOP concept of an object at runtime






22. An asymmetric cryptography mechanism that provides authentication.






23. Uncleared buffers or media






24. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






25. A process state - to be executing a process on the CPU






26. A mobilized resource purchased or contracted for the purpose of business recovery.






27. Consume resources to a point of exhaustion - loss of availability






28. OOP concept of a distinct copy of the class






29. Wrong against society






30. A system designed to prevent unauthorized access to or from a private network.






31. Outputs within a given function are the same result






32. A back up type - where the organization has excess capacity in another location.






33. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






34. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






35. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






36. An encryption method that has a key as long as the message






37. Inappropriate data






38. Potentially compromising leakage of electrical or acoustical signals.






39. The chance that something negative will occur






40. A technology that reduces the size of a file.






41. Recognition of an individual's assertion of identity.






42. The partial or full duplication of data from a source database to one or more destination databases.






43. OOP concept of a template that consist of attributes and behaviors






44. Pertaining to law - high degree of veracity






45. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






46. To jump to a conclusion






47. Return to a normal state






48. Memory - RAM






49. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






50. An event which stops business from continuing.