Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Key






2. Event(s) that cause harm






3. A mobilized resource purchased or contracted for the purpose of business recovery.






4. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






5. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.






6. High level - pertaining to planning






7. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






8. Written suggestions that direct choice to a few alternatives






9. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






10. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






11. Control category- to record an adversary's actions






12. Intellectual property protection for an confidential and critical process






13. OOP concept of a taking attributes from the original or parent






14. A hash that has been further encrypted with a symmetric algorithm






15. More than one processor sharing same memory - also know as parallel systems






16. Property that data is represented in the same manner at all times






17. A programming design concept which abstracts one set of functions from another in a serialized fashion






18. Low level - pertaining to planning






19. Security policy - procedures - and compliance enforcement






20. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






21. Subjects will not interact with each other's objects






22. Unauthorized wireless network access device.






23. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






24. OOP concept of an object at runtime






25. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.






26. A form of data hiding which protects running threads of execution from using each other's memory






27. A passive network attack involving monitoring of traffic.






28. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






29. Line by line translation from a high level language to machine code






30. Objects or programming that looks the different but act same






31. The core logic engine of an operating system which almost never changes






32. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






33. Less granular organization of controls -






34. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






35. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






36. Interception of a communication session by an attacker.






37. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






38. Code breaking - practice of defeating the protective properties of cryptography.






39. A disturbance that degrades performance of electronic devices and electronic communications.






40. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






41. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






42. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






43. Maximum tolerance for loss of certain business function - basis of strategy






44. Used to code/decode a digital data stream.






45. OOP concept of a class's details to be hidden from object






46. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






47. A planned or unplanned interruption in system availability.






48. Eight bits.






49. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






50. Owner directed mediation of access