Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pertaining to law - no omissions






2. Potential danger to information or systems






3. Written suggestions that direct choice to a few alternatives






4. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






5. Malware that subverts the detective controls of an operating system






6. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






7. Independent malware that requires user interaction to execute






8. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






9. Binary decision by a system of permitting or denying access to the entire system






10. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






11. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






12. Eavesdropping on network communications by a third party.






13. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






14. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






15. Vehicle or tool that exploits a weakness






16. A shield against leakage of electromagnetic signals.






17. The property that data meet with a priority expectation of quality and that the data can be relied upon.






18. Moving letters around






19. Policy or stated actions






20. Code breaking - practice of defeating the protective properties of cryptography.






21. For PKI - to have more than one person in charge of a sensitive function






22. Lower frequency noise






23. A control before attack






24. Can be statistical (monitor behavior) or signature based (watch for known attacks)






25. Trading one for another






26. Intellectual property protection for marketing efforts






27. To segregate for the purposes of labeling






28. Eavesdropping on network communications by a third party.






29. Uses two or more legal systems






30. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






31. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






32. A type of attack involving attempted insertion - deletion or altering of data.






33. Summary of a communication for the purpose of integrity






34. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.






35. High level design or model with a goal of consistency - integrity - and balance






36. Intellectual property management technique for identifying after distribution






37. Encryption system using a pair of mathematically related unequal keys






38. A record that must be preserved and available for retrieval if needed.






39. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






40. False memory reference






41. Just enough access to do the job






42. An availability attack - to consume resources to the point of exhaustion






43. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






44. Inference about encrypted communications






45. DoS - Spoofing - dictionary - brute force - wardialing






46. Alternate facility - other than the primary production site - where duplicated vital records and documentation may be stored for use during disaster recovery.






47. The principles a person sets for themselves to follow






48. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






49. Owner directed mediation of access






50. Reduces causes of fire