Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






2. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






3. Owner directed mediation of access






4. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






5. Control category- to restore to a previous state by removing the adversary and or the results of their actions






6. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






7. Control category - more than one control on a single asset






8. Communication of a security incident to stakeholders and data owners.






9. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






10. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






11. Unauthorized access of network devices.






12. High level design or model with a goal of consistency - integrity - and balance






13. Process of statistically testing a data set for the likelihood of relevant information.






14. Indivisible - data field must contain only one value that either all transactions take place or none do






15. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






16. Business and technical process of applying security software updates in a regulated periodic way






17. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






18. A Trojan horse with the express underlying purpose of controlling host from a distance






19. Means the systems design and level of protection are verifiable and provide the highest level of assurance and trust.






20. Unsolicited commercial email






21. To segregate for the purposes of labeling






22. Return to a normal state






23. To know more than one job






24. Third party processes used to organize the implementation of an architecture






25. Induces a crime - tricks a person - and is illegal






26. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






27. Is secondhand and usually not admissible in court






28. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






29. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






30. An asymmetric cryptography mechanism that provides authentication.






31. Those who initiate the attack






32. Written internalized or nationalized norms that are internal to an organization






33. Code making






34. Malware that makes small random changes to many data points






35. Long term knowledge building






36. A layer 2 device that used to connect two or more network segments and regulate traffic.






37. To reduce sudden rises in current






38. Key






39. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






40. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






41. Mediation of covert channels must be addressed






42. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






43. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






44. Intellectual property protection for marketing efforts






45. A planned or unplanned interruption in system availability.






46. Weakness or flaw in an asset






47. The level and label given to an individual for the purpose of compartmentalization






48. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






49. Vehicle stopping object






50. A state for operating system tasks only