Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Written internalized or nationalized norms that are internal to an organization






2. To start business continuity processes






3. Prolonged loss of commercial power






4. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






5. The problems solving state - the opposite of supervisor mode






6. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






7. Implementation of operating system protection mechanism - where more sensitive built upon the layering concept






8. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






9. To execute more than one instruction at an instant in time






10. Pertaining to law - high degree of veracity






11. Forging of an IP address.






12. For PKI - to store another copy of a key






13. Mitigation of system or component loss or interruption through use of backup capability.






14. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






15. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






16. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






17. Uncheck data input which results in redirection






18. The property that data meet with a priority expectation of quality and that the data can be relied upon.






19. A Denial of Service attack that floods the target system with connection requests that are not finalized.






20. Line noise that is superimposed on the supply circuit.






21. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






22. A mathematical tool for verifying no unintentional changes have been made






23. Can be statistical (monitor behavior) or signature based (watch for known attacks)






24. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






25. To load the first piece of software that starts a computer.






26. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






27. High level design or model with a goal of consistency - integrity - and balance






28. Used to code/decode a digital data stream.






29. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






30. An availability attack - to consume resources to the point of exhaustion






31. An alert or alarm that is triggered when no actual attack has taken place






32. People who interact with assets






33. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






34. Converts source code to an executable






35. Renders the record inaccessible to the database management system






36. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






37. Recording activities at the keyboard level






38. Owner directed mediation of access






39. Natural occurrence in circuits that are in close proximity






40. Tool which mediates access






41. A planned or unplanned interruption in system availability.






42. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






43. Controls deployed to avert unauthorized and/or undesired actions.






44. Is secondhand and usually not admissible in court






45. To smooth out reductions or increases in power






46. Code breaking - practice of defeating the protective properties of cryptography.






47. More than one CPU on a single board






48. Pertaining to law - lending it self to one side of an argument






49. A process state - to be either be unable to run waiting for an external event or terminated






50. OOP concept of an object at runtime