Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






2. Try a list of words in passwords or encryption keys






3. A trusted issuer of digital certificates






4. Guidelines within an organization that control the rules and configurations of an IDS






5. A device that sequentially switches multiple analog inputs to the output.






6. Initial surge of current






7. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






8. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






9. Converts a high level language into machine language






10. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






11. Controls for termination of attempt to access object






12. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






13. Descrambling the encrypted message with the corresponding key






14. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






15. Dedicated fast memory located on the same board as the CPU






16. Object based description of a system or a collection of resources






17. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination






18. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






19. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






20. A technology that reduces the size of a file.






21. Pertaining to law - accepted by a court






22. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






23. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






24. A control after attack






25. Forging of an IP address.






26. A signal suggesting a system has been or is being attacked.






27. Pertaining to law - high degree of veracity






28. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






29. Recovery alternative - short-term - high cost movable processing location






30. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






31. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






32. For PKI - decertify an entities certificate






33. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






34. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






35. Written internalized or nationalized norms that are internal to an organization






36. Eavesdropping on network communications by a third party.






37. A database backup type which records at the transaction level






38. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






39. Requirement of access to data for a clearly defined purpose






40. The core of a computer that calculates






41. Pertaining to law - verified as real






42. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






43. Reduction of voltage by the utility company for a prolonged period of time






44. Written step-by-step actions






45. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






46. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






47. Two different keys decrypt the same cipher text






48. The principles a person sets for themselves to follow






49. All of the protection mechanism in a computer system






50. A risk assessment method - intrinsic value