Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recognition of an individual's assertion of identity.






2. Firewalls - encryption - and access control lists






3. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






4. Tool which mediates access






5. A template for the designing the architecture






6. Is secondhand and usually not admissible in court






7. Encryption system using shared key/private key/single key/secret key






8. Recovery alternative - complete duplication of services including personnel






9. Of a system without prior knowledge by the tester or the tested






10. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






11. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






12. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






13. Requirement of access to data for a clearly defined purpose






14. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






15. To stop damage from spreading






16. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






17. A type of attack involving attempted insertion - deletion or altering of data.






18. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






19. Control category- to discourage an adversary from attempting to access






20. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






21. Recording the Who What When Where How of evidence






22. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






23. Organized group of compromised computers






24. More than one CPU on a single board






25. Real-time - automatic and transparent backup of data.






26. For PKI - to store another copy of a key






27. Renders the file inaccessible to the operating system - available to reuse for data storage.






28. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






29. Controls for termination of attempt to access object






30. Also known as regulatory laws - covers standards of performance or conduct expected by government agencies from companies - industries - and certain officials






31. Key






32. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






33. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






34. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






35. Lower frequency noise






36. A form of data hiding which protects running threads of execution from using each other's memory






37. A type a computer memory that temporarily stores frequently used information for quick access.






38. Communicate to stakeholders






39. A Denial of Service attack that exploits systems that are not able to handle malicious - overlapping and oversized IP fragments.






40. DoS - Spoofing - dictionary - brute force - wardialing






41. To move from location to location - keeping the same function






42. Methodical research of an incident with the purpose of finding the root cause






43. Granular decision by a system of permitting or denying access to a particular resource on the system






44. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






45. Natural occurrence in circuits that are in close proximity






46. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






47. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






48. Part of a transaction control for a database which informs the database of the last recorded transaction






49. Impossibility of denying authenticity and identity






50. A back up type - where the organization has excess capacity in another location.