Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






2. An administrative unit or a group of objects and subjects controlled by one reference monitor






3. Someone who want to know how something works - typically by taking it apart






4. A form of data hiding which protects running threads of execution from using each other's memory






5. An availability attack - to consume resources to the point of exhaustion






6. Creation distribution update and deletion






7. Planning for the delegation of authority required when decisions must be made without the normal chain of command






8. A disturbance that degrades performance of electronic devices and electronic communications.






9. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






10. Potentially compromising leakage of electrical or acoustical signals.






11. System mediation of access with the focus on the context of the request






12. Using many alphabets






13. Something that happened






14. False memory reference






15. Natural occurrence in circuits that are in close proximity






16. A device that converts between digital and analog representation of data.






17. System of law based upon precedence - with major divisions of criminal - tort - and administrative






18. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






19. Planning with a goal of returning to the normal business function






20. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






21. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






22. Evaluation of a system without prior knowledge by the tester






23. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






24. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






25. Potentially retrievable data residue that remains following intended erasure of data.






26. Small data warehouse






27. Subject based description of a system or a collection of resources






28. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






29. Uncheck data input which results in redirection






30. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






31. Statistical probabilities of a collision are more likely than one thinks






32. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






33. Encryption system using shared key/private key/single key/secret key






34. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






35. A secure connection to another network.






36. The hard drive






37. Quantity of risk remaining after a control is applied






38. Act of scrambling the cleartext message by using a key.






39. Control category - more than one control on a single asset






40. Requirement of access to data for a clearly defined purpose






41. Of a system without prior knowledge by the tester or the tested






42. A passive network attack involving monitoring of traffic.






43. A hash that has been further encrypted with a symmetric algorithm






44. Control category- to restore to a previous state by removing the adversary and or the results of their actions






45. Malware that makes many small changes over time to a single data point or system






46. A race condition where the security changes during the object's access






47. Those who initiate the attack






48. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






49. Recovery alternative - everything needed for the business function - except people and last backup






50. Moving letters around