Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.






2. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






3. Sudden rise in voltage in the power supply.






4. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






5. A layer 2 device that used to connect two or more network segments and regulate traffic.






6. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






7. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






8. Mitigation of system or component loss or interruption through use of backup capability.






9. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






10. For PKI - to have more than one person in charge of a sensitive function






11. Is secondhand and usually not admissible in court






12. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






13. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






14. The study of cryptography and cryptanalysis






15. The partial or full duplication of data from a source database to one or more destination databases.






16. Information about a particular data set






17. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






18. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






19. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






20. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






21. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






22. A condition in which neither party is willing to stop their activity for the other to complete






23. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.






24. Representatives from each functional area or department get together and walk through the plan from beginning to end.






25. Hiding the fact that communication has occurred






26. Firewalls - encryption - and access control lists






27. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






28. A unit of execution






29. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






30. High level - pertaining to planning






31. An individuals conduct that violates government laws developed to protect the public






32. A collection of information designed to reduce duplication and increase integrity






33. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






34. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






35. Reduction of voltage by the utility company for a prolonged period of time






36. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






37. More than one CPU on a single board






38. Moving the alphabet intact a certain number spaces






39. Vehicle or tool that exploits a weakness






40. Hardware or software that is part of a larger system






41. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






42. Unused storage capacity






43. Regular operations are stopped and where processing is moved to the alternate site.






44. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






45. Try a list of words in passwords or encryption keys






46. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






47. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






48. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






49. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






50. Organized group of compromised computers