Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






2. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






3. Intellectual property protection for the expression of an idea






4. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






5. A type a computer memory that temporarily stores frequently used information for quick access.






6. The first rating that requires security labels






7. A choice in risk management - to convince another to assume risk - typically by payment






8. All of the protection mechanism in a computer system






9. Organized group of compromised computers






10. Binary decision by a system of permitting or denying access to the entire system






11. A back up type - where the organization has excess capacity in another location.






12. A programming device use in development to circumvent controls






13. A risk assessment method - measurable real money cost






14. A electronic attestation of identity by a certificate authority






15. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






16. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






17. A passive network attack involving monitoring of traffic.






18. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






19. Processes data at different classifications (security levels) and users with different clearances (security levels) can use the system.






20. Final purpose or result






21. Recording the Who What When Where How of evidence






22. Natural occurrence in circuits that are in close proximity






23. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






24. For PKI - to store another copy of a key






25. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






26. To create a copy of data as a precaution against the loss or damage of the original data.






27. The level and label given to an individual for the purpose of compartmentalization






28. The hard drive






29. A type of attack involving attempted insertion - deletion or altering of data.






30. An administrative unit or a group of objects and subjects controlled by one reference monitor






31. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






32. A design methodology which addresses risk early and often






33. Eavesdropping on network communications by a third party.






34. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






35. A covert storage channel on the file attribute






36. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






37. Part of a transaction control for a database which informs the database of the last recorded transaction






38. Return to a normal state






39. Weakness or flaw in an asset






40. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






41. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






42. An availability attack - to consume resources to the point of exhaustion from multiple vectors






43. A device that sequentially switches multiple analog inputs to the output.






44. Ertaining to a number system that has just two unique digits.






45. A program that waits for a condition or time to occur that executes an inappropriate activity






46. Intellectual property protection for marketing efforts






47. Calculation encompassing threats - vulnerabilities and assets






48. Regular operations are stopped and where processing is moved to the alternate site.






49. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






50. Subjects will not interact with each other's objects