Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






2. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






3. Recording the Who What When Where How of evidence






4. Calculation encompassing threats - vulnerabilities and assets






5. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






6. A collection of data or information that has a name






7. Sudden rise in voltage in the power supply.






8. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






9. Renders the file inaccessible to the operating system - available to reuse for data storage.






10. A protocol for the efficient transmission of voice over the Internet






11. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






12. A running key using a random key that is never used again






13. More than one processor sharing same memory - also know as parallel systems






14. Short period of low voltage.






15. Key






16. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






17. An attack involving the hijacking of a TCP session by predicting a sequence number.






18. Process whereby data is removed from active files and other data storage structures






19. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.






20. To segregate for the purposes of labeling






21. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






22. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






23. Physical description on the exterior of an object that communicates the existence of a label






24. Lower frequency noise






25. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






26. Vehicle or tool that exploits a weakness






27. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






28. More than one CPU on a single board






29. Joining two pieces of text






30. Inappropriate data






31. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






32. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






33. Substitution at the word or phrase level






34. Can be statistical (monitor behavior) or signature based (watch for known attacks)






35. Act of scrambling the cleartext message by using a key.






36. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






37. Control type- that is communication based - typically written or oral






38. Using small special tools all tumblers of the lock are aligned - opening the door






39. A Trojan horse with the express underlying purpose of controlling host from a distance






40. The hard drive






41. To load the first piece of software that starts a computer.






42. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






43. A state for operating system tasks only






44. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






45. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






46. A type a computer memory that temporarily stores frequently used information for quick access.






47. Those who initiate the attack






48. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






49. Malware that makes many small changes over time to a single data point or system






50. Written core statements that rarely change