Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hitting a filed down key in a lock with a hammer to open without real key






2. Reduction of voltage by the utility company for a prolonged period of time






3. High frequency noise






4. Forging of an IP address.






5. Power surge






6. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






7. A risk assessment method - measurable real money cost






8. Converts a high level language into machine language






9. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






10. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






11. Momentary loss of power






12. Intellectual property protection for an confidential and critical process






13. Methodical research of an incident with the purpose of finding the root cause






14. Control category- to give instructions or inform






15. A layer 2 device that used to connect two network segments and regulate traffic.






16. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






17. Quantity of risk remaining after a control is applied






18. A programming device use in development to circumvent controls






19. Unchecked data which spills into another location in memory






20. Intermediate level - pertaining to planning






21. For PKI - decertify an entities certificate






22. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






23. What is will remain - persistence






24. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






25. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






26. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






27. A design methodology which addresses risk early and often






28. Less granular organization of controls -






29. Sphere of influence






30. Pertaining to law - accepted by a court






31. Impossibility of denying authenticity and identity






32. Identification and notification of an unauthorized and/or undesired action






33. The event signaling an IDS to produce an alarm when no attack has taken place






34. The managerial approval to operate a system based upon knowledge of risk to operate






35. Those who initiate the attack






36. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






37. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






38. Hiding the fact that communication has occurred






39. Eight bits.






40. Interception of a communication session by an attacker.






41. Threats x Vulnerability x Asset Value = Total Risk






42. Alerts personnel to the presence of a fire






43. Descrambling the encrypted message with the corresponding key






44. Consume resources to a point of exhaustion - loss of availability






45. Moving letters around






46. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






47. Communicate to stakeholders






48. A documented battle plan for coordinating response to incidents.






49. Mediation of covert channels must be addressed






50. Total number of keys available that may be selected by the user of a cryptosystem