Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technology that reduces the size of a file.






2. A trusted issuer of digital certificates






3. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






4. Mitigate damage by isolating compromised systems from the network.






5. Threats x Vulnerability x Asset Value = Total Risk






6. Randomly-generated value used by many cryptosystems to ensure that a unique ciphertext is generated






7. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






8. A process state - to be either be unable to run waiting for an external event or terminated






9. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






10. Tool which mediates access






11. A template for the designing the architecture






12. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






13. Actions measured against either a policy or what a reasonable person would do






14. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






15. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






16. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






17. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






18. A collection of information designed to reduce duplication and increase integrity






19. Recording activities at the keyboard level






20. The technical and risk assesment of a system within the context of the operating environment






21. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






22. The problems solving state - the opposite of supervisor mode






23. Claiming another's identity at a physical level






24. A running key using a random key that is never used again






25. Try a list of words in passwords or encryption keys






26. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






27. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






28. A risk assessment method - measurable real money cost






29. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






30. Used to code/decode a digital data stream.






31. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






32. Statistical probabilities of a collision are more likely than one thinks






33. To break a business process into separate functions and assign to different people






34. Potentially retrievable data residue that remains following intended erasure of data.






35. RADIUS - TACACS+ - Diameter






36. OOP concept of a distinct copy of the class






37. To load the first piece of software that starts a computer.






38. The first rating that requires security labels






39. Power surge






40. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






41. Control type- that is communication based - typically written or oral






42. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






43. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






44. Residual Data (sometimes referred to as "Ambient Data") refers to data that is not active on a computer system.






45. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






46. For PKI - decertify an entities certificate






47. A hash that has been further encrypted with a symmetric algorithm






48. People protect their domain






49. Transaction controls for a database - a return to a previous state






50. Creation distribution update and deletion