Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A planned or unplanned interruption in system availability.






2. Provides a physical cross connect point for devices.






3. System mediation of access with the focus on the context of the request






4. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






5. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






6. Unauthorized access of network devices.






7. Uncheck data input which results in redirection






8. To set the clearance of a subject or the classification of an object






9. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






10. A failure of an IDS to detect an actual attack






11. Quantity of risk remaining after a control is applied






12. A layer 2 device that used to connect two network segments and regulate traffic.






13. A world-wide wireless technology






14. Data or interference that can trigger a false positive






15. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






16. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






17. Real-time - automatic and transparent backup of data.






18. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






19. Key






20. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






21. The guardian of asset(s) - a maintenance activity






22. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






23. Responsibility for actions






24. Is secondhand and usually not admissible in court






25. Eavesdropping on network communications by a third party.






26. Vehicle stopping object






27. Unsolicited advertising software






28. A Denial of Service attack that floods the target system with connection requests that are not finalized.






29. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






30. To reduce fire






31. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






32. Control category- to give instructions or inform






33. A type of malformed input that takes advantage of an appropriate true conditional logic statement adding a request for data that is against the security policy






34. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






35. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






36. Recording activities at the keyboard level






37. State of computer - to be running a process






38. The hard drive






39. Guidelines within an organization that control the rules and configurations of an IDS






40. Controls for logging and alerting






41. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






42. A documented battle plan for coordinating response to incidents.






43. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






44. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






45. Disk space it used to occupy has been designated by the computer as available for reuse. The deleted file remains intact until it has been overwritten with a new file.






46. A device that sequentially switches multiple analog inputs to the output.






47. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






48. Descrambling the encrypted message with the corresponding key






49. A database that contains the name - type - range of values - source and authorization for access for each data element






50. A layer 2 device that used to connect two or more network segments and regulate traffic.