Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The core of a computer that calculates






2. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






3. A collection of information designed to reduce duplication and increase integrity






4. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






5. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






6. An individuals conduct that violates government laws developed to protect the public






7. An availability attack - to consume resources to the point of exhaustion






8. Mediation of covert channels must be addressed






9. To reduce sudden rises in current






10. System directed mediation of access with labels






11. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






12. A template for the designing the architecture






13. A passive network attack involving monitoring of traffic.






14. Evidence must be: admissible - authentic - complete - accurate - and convincing






15. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






16. Renders the record inaccessible to the database management system






17. Communication of a security incident to stakeholders and data owners.






18. Potentially compromising leakage of electrical or acoustical signals.






19. Control category- to restore to a previous state by removing the adversary and or the results of their actions






20. Collection of data on business functions which determines the strategy of resiliency






21. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






22. A Denial of Service attack that floods the target system with connection requests that are not finalized.






23. A disturbance that degrades performance of electronic devices and electronic communications.






24. Property that data is represented in the same manner at all times






25. A set of laws that the organization agrees to be bound by






26. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






27. A failure of an IDS to detect an actual attack






28. Small data files written to a user's hard drive by a web server.






29. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






30. A type of multitasking that allows for more even distribution of computing time among competing request






31. A condition in which neither party is willing to stop their activity for the other to complete






32. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






33. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






34. Of a system without prior knowledge by the tester or the tested






35. Requirement to take time off






36. An image compression standard for photographs






37. Scrambled form of the message or data






38. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






39. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






40. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






41. Someone who want to know how something works - typically by taking it apart






42. An unintended communication path






43. A protocol for the efficient transmission of voice over the Internet






44. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






45. To evaluate the current situation and make basic decisions as to what to do






46. Recovery alternative - a building only with sufficient power - and HVAC






47. Wrong against society






48. Owner directed mediation of access






49. Most granular organization of controls






50. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.