Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






2. Total number of keys available that may be selected by the user of a cryptosystem






3. Power surge






4. Narrow scope examination of a system






5. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






6. Final purpose or result






7. A technology that reduces the size of a file.






8. Reprogrammable basic startup instructions






9. Can be statistical (monitor behavior) or signature based (watch for known attacks)






10. A system that enforces an access control policy between two networks.






11. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






12. Act of luring an intruder and is legal.






13. A choice in risk management - to convince another to assume risk - typically by payment






14. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






15. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






16. Recording activities at the keyboard level






17. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






18. Review of data






19. Physical description on the exterior of an object that communicates the existence of a label






20. The core of a computer that calculates






21. Location where coordination and execution of BCP or DRP is directed






22. The study of cryptography and cryptanalysis






23. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






24. Sphere of influence






25. Abstract and mathematical in nature - defining all possible states - transitions and operations






26. Written internalized or nationalized norms that are internal to an organization






27. A disturbance that degrades performance of electronic devices and electronic communications.






28. A risk assessment method - measurable real money cost






29. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






30. Asymmetric encryption of a hash of message






31. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






32. Code breaking - practice of defeating the protective properties of cryptography.






33. A telephone exchange for a specific office or business.






34. Eavesdropping on network communications by a third party.






35. Deals with discretionary protection






36. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






37. The chance that something negative will occur






38. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






39. Consume resources to a point of exhaustion - loss of availability






40. A choice in risk management - to implement a control that limits or lessens negative effects






41. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






42. Pertaining to law - no omissions






43. A layer 2 device that used to connect two network segments and regulate traffic.






44. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






45. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






46. Real-time data backup ( Data Mirroring)






47. Lower frequency noise






48. A shield against leakage of electromagnetic signals.






49. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






50. A Trojan horse with the express underlying purpose of controlling host from a distance