Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






2. A passive network attack involving monitoring of traffic.






3. Momentary loss of power






4. OOP concept of an object's abilities - what it does






5. The principles a person sets for themselves to follow






6. A condition in which neither party is willing to stop their activity for the other to complete






7. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






8. A temporary public file to inform others of a compromised digital certificate






9. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






10. Unauthorized access of network devices.






11. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






12. Recording activities at the keyboard level






13. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






14. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






15. A process state - (blocked) needing input before continuing






16. To stop damage from spreading






17. A world-wide wireless technology






18. A program that waits for a condition or time to occur that executes an inappropriate activity






19. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






20. A state for operating system tasks only






21. A device that provides the functions of both a bridge and a router.






22. Alerts personnel to the presence of a fire






23. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






24. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






25. A telephone exchange for a specific office or business.






26. Inference about encrypted communications






27. RADIUS - TACACS+ - Diameter






28. A Denial of Service attack that floods the target system with connection requests that are not finalized.






29. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






30. To execute more than one instruction at an instant in time






31. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






32. An unintended communication path






33. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






34. Vehicle or tool that exploits a weakness






35. Most granular organization of controls






36. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






37. Fault tolerance for power






38. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






39. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






40. A legal enforceable agreement between: two people - two organizations - a person and an organization.






41. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






42. Information about data or records






43. Subject based description of a system or a collection of resources






44. All of the protection mechanism in a computer system






45. A database backup type which records at the transaction level






46. Ertaining to a number system that has just two unique digits.






47. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






48. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






49. Mediation of subject and object interactions






50. With enough computing power trying all possible combinations