Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






2. Uncheck data input which results in redirection






3. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






4. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






5. Event(s) that cause harm






6. Pertaining to law - high degree of veracity






7. Searching for wireless networks in a moving car.






8. Object reuse protection and auditing






9. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






10. Two different keys decrypt the same cipher text






11. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






12. Granular decision by a system of permitting or denying access to a particular resource on the system






13. Statistical probabilities of a collision are more likely than one thinks






14. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






15. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






16. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






17. More than one processor sharing same memory - also know as parallel systems






18. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






19. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






20. A one way - directed graph which indicates confidentiality or integrity flow






21. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






22. A secure connection to another network.






23. A type of attack involving attempted insertion - deletion or altering of data.






24. Vehicle stopping object






25. Intellectual property protection for an invention






26. The problems solving state - the opposite of supervisor mode






27. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






28. Forging of an IP address.






29. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






30. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






31. A system designed to prevent unauthorized access to or from a private network.






32. Controls for termination of attempt to access object






33. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






34. Subjects will not interact with each other's objects






35. An unintended communication path






36. Reduces causes of fire






37. Evidence must be: admissible - authentic - complete - accurate - and convincing






38. OOP concept of a template that consist of attributes and behaviors






39. Summary of a communication for the purpose of integrity






40. Individuals and departments responsible for the storage and safeguarding of computerized data.






41. Methodical research of an incident with the purpose of finding the root cause






42. Collection of data on business functions which determines the strategy of resiliency






43. Joining two pieces of text






44. Recovery alternative which includes cold site and some equipment and infrastructure is available






45. A backup of data located where staff can gain access immediately






46. Dedicated fast memory located on the same board as the CPU






47. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






48. All of the protection mechanism in a computer system






49. A device that sequentially switches multiple analog inputs to the output.






50. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware