Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






2. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






3. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






4. System of law based upon precedence - with major divisions of criminal - tort - and administrative






5. A backup type which creates a complete copy






6. Recognition of an individual's assertion of identity.






7. Memory management technique that allows two processes to run concurrently without interaction






8. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






9. A race condition where the security changes during the object's access






10. OOP concept of an object at runtime






11. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






12. Maintenance procedures outline the process for the review and update of business continuity plans.






13. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






14. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






15. Line noise that is superimposed on the supply circuit.






16. Encryption system using a pair of mathematically related unequal keys






17. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






18. Pertaining to law - verified as real






19. A layer 3 device that used to connect two or more network segments and regulate traffic.






20. Written internalized or nationalized norms that are internal to an organization






21. Inference about encrypted communications






22. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






23. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






24. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






25. Location where coordination and execution of BCP or DRP is directed






26. Communicate to stakeholders






27. Uncheck data input which results in redirection






28. Short period of low voltage.






29. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






30. The managerial approval to operate a system based upon knowledge of risk to operate






31. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






32. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






33. Malware that makes small random changes to many data points






34. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






35. Asymmetric encryption of a hash of message






36. Objects or programming that looks the different but act same






37. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






38. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






39. Program that inappropriately collects private data or activity






40. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






41. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






42. All of the protection mechanism in a computer system






43. Return to a normal state






44. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






45. Amount of time for restoring a business process or function to normal operations without major loss






46. Hitting a filed down key in a lock with a hammer to open without real key






47. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






48. Momentary loss of power






49. To reduce fire






50. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress