Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Control category- to discourage an adversary from attempting to access






2. Natural occurrence in circuits that are in close proximity






3. Provides a physical cross connect point for devices.






4. More than one process in the middle of executing at a time






5. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






6. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






7. To create a copy of data as a precaution against the loss or damage of the original data.






8. Momentary loss of power






9. A state where two subjects can access the same object without proper mediation






10. Communicate to stakeholders






11. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






12. One entity with two competing allegiances






13. Requirement of access to data for a clearly defined purpose






14. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






15. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






16. Power surge






17. Planning with a goal of returning to the normal business function






18. A protocol for the efficient transmission of voice over the Internet






19. Pertaining to law - accepted by a court






20. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






21. A collection of data or information that has a name






22. A design methodology which executes in a linear one way fashion






23. Small data files written to a user's hard drive by a web server.






24. Converts source code to an executable






25. For PKI - decertify an entities certificate






26. Statistical probabilities of a collision are more likely than one thinks






27. Of a system without prior knowledge by the tester or the tested






28. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






29. Forging of an IP address.






30. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






31. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.






32. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






33. Descrambling the encrypted message with the corresponding key






34. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






35. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






36. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






37. A type a computer memory that temporarily stores frequently used information for quick access.






38. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






39. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






40. A trusted issuer of digital certificates






41. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






42. To jump to a conclusion






43. A layer 3 device that used to connect two or more network segments and regulate traffic.






44. More than one CPU on a single board






45. Creation distribution update and deletion






46. A form of data hiding which protects running threads of execution from using each other's memory






47. Two certificate authorities that trust each other






48. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






49. A control before attack






50. A group or network of honeypots