Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recovery alternative which outsources a business function at a cost






2. To move from location to location - keeping the same function






3. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






4. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






5. Intellectual property protection for the expression of an idea






6. Encryption system using a pair of mathematically related unequal keys






7. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






8. To reduce sudden rises in current






9. Business and technical process of applying security software updates in a regulated periodic way






10. High level - pertaining to planning






11. An encryption method that has a key as long as the message






12. Unused storage capacity






13. DoS - Spoofing - dictionary - brute force - wardialing






14. Intellectual property protection for marketing efforts






15. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






16. Control category- to discourage an adversary from attempting to access






17. Renders the record inaccessible to the database management system






18. Autonomous malware that requires a flaw in a service






19. Communicate to stakeholders






20. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






21. A device that provides the functions of both a bridge and a router.






22. Quantity of risk remaining after a control is applied






23. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






24. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






25. The collection and summation of risk data relating to a particular asset and controls for that asset






26. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






27. State of computer - to be running a process






28. RADIUS - TACACS+ - Diameter






29. Control category - more than one control on a single asset






30. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






31. Moving letters around






32. Trading one for another






33. Actions measured against either a policy or what a reasonable person would do






34. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






35. A mail server that improperly allows inbound SMTP connections for domains it does not serve.






36. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






37. A disturbance that degrades performance of electronic devices and electronic communications.






38. False memory reference






39. Pertaining to law - no omissions






40. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






41. Two different keys decrypt the same cipher text






42. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






43. Fault tolerance for power






44. To assert or claim credentialing to an authentication system






45. Reprogrammable basic startup instructions






46. Organized group of compromised computers






47. A system designed to prevent unauthorized access to or from a private network.






48. Some systems are actually run at the alternate site






49. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






50. One entity with two competing allegiances