Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Intermediate level - pertaining to planning






2. Provides a physical cross connect point for devices.






3. Pertaining to law - lending it self to one side of an argument






4. Some systems are actually run at the alternate site






5. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






6. Descrambling the encrypted message with the corresponding key






7. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






8. Recovery alternative - complete duplication of services including personnel






9. The technical and risk assesment of a system within the context of the operating environment






10. Object reuse protection and auditing






11. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






12. Threats x Vulnerability x Asset Value = Total Risk






13. Moving letters around






14. Encryption system using a pair of mathematically related unequal keys






15. Memory management technique which allows data to be moved from one memory address to another






16. To smooth out reductions or increases in power






17. Record of system activity - which provides for monitoring and detection.






18. DoS - Spoofing - dictionary - brute force - wardialing






19. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






20. Can be statistical (monitor behavior) or signature based (watch for known attacks)






21. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






22. The chance that something negative will occur






23. Code breaking - practice of defeating the protective properties of cryptography.






24. Maximum tolerance for loss of certain business function - basis of strategy






25. Memory - RAM






26. A control before attack






27. Adversary intercepts encrypted communications - decrypts - views - encrypts - and send along to the true destination






28. People who interact with assets






29. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






30. A shield against leakage of electromagnetic signals.






31. Controls for termination of attempt to access object






32. A running key using a random key that is never used again






33. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






34. System of law based upon what is good for society






35. Unchecked data which spills into another location in memory






36. Small data files written to a user's hard drive by a web server.






37. To segregate for the purposes of labeling






38. Used to code/decode a digital data stream.






39. A Denial of Service attack that floods the target system with connection requests that are not finalized.






40. Review of data






41. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






42. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






43. Key






44. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






45. Scrambled form of the message or data






46. A planned or unplanned interruption in system availability.






47. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






48. A test conducted on one or more components of a plan under actual operating conditions.






49. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






50. A temporary public file to inform others of a compromised digital certificate