Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






2. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






3. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






4. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






5. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






6. Unauthorized wireless network access device.






7. To assert or claim credentialing to an authentication system






8. Act of luring an intruder and is legal.






9. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






10. To stop damage from spreading






11. Unsolicited advertising software






12. The chance that something negative will occur






13. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






14. To break a business process into separate functions and assign to different people






15. Memory management technique which allows data to be moved from one memory address to another






16. To jump to a conclusion






17. Pertaining to law - verified as real






18. A telephone exchange for a specific office or business.






19. A process state - to be executing a process on the CPU






20. Collection of data on business functions which determines the strategy of resiliency






21. Maintenance procedures outline the process for the review and update of business continuity plans.






22. Forgery of the sender's email address in an email header.






23. Moving the alphabet intact a certain number spaces






24. An availability attack - to consume resources to the point of exhaustion






25. A type a computer memory that temporarily stores frequently used information for quick access.






26. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






27. The partial or full duplication of data from a source database to one or more destination databases.






28. To reduce fire






29. Uses two or more legal systems






30. Mathematical function that determines the cryptographic operations






31. Of a system without prior knowledge by the tester or the tested






32. Unchecked data which spills into another location in memory






33. A backup of data located where staff can gain access immediately






34. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






35. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






36. Controls for termination of attempt to access object






37. The study of cryptography and cryptanalysis






38. A set of laws that the organization agrees to be bound by






39. A risk assessment method - measurable real money cost






40. Outputs within a given function are the same result






41. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






42. A design methodology which executes in a linear one way fashion






43. To create a copy of data as a precaution against the loss or damage of the original data.






44. Information about data or records






45. Controls deployed to avert unauthorized and/or undesired actions.






46. The property that data meet with a priority expectation of quality and that the data can be relied upon.






47. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






48. Hitting a filed down key in a lock with a hammer to open without real key






49. Objects or programming that looks the different but act same






50. A trusted issuer of digital certificates