Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two different keys decrypt the same cipher text






2. Recovery alternative - complete duplication of services including personnel






3. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






4. Security policy - procedures - and compliance enforcement






5. A control before attack






6. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






7. Someone who want to know how something works - typically by taking it apart






8. Binary decision by a system of permitting or denying access to the entire system






9. Intellectual property protection for marketing efforts






10. To know more than one job






11. To evaluate the current situation and make basic decisions as to what to do






12. Review of data






13. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






14. A programming design philosophy and a type of programming language - which breaks a program into smaller units. Each unit has its own function.






15. Short period of low voltage.






16. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






17. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






18. The first rating that requires security labels






19. Low level - pertaining to planning






20. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






21. Line by line translation from a high level language to machine code






22. Collection of data on business functions which determines the strategy of resiliency






23. A device that provides the functions of both a bridge and a router.






24. Encryption system using shared key/private key/single key/secret key






25. Enclosure of electronic communication devices to prevent leakage of electromagnetic signals.






26. Property that data is represented in the same manner at all times






27. Descrambling the encrypted message with the corresponding key






28. Methodical research of an incident with the purpose of finding the root cause






29. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






30. Someone who wants to cause harm






31. Requirement to take time off






32. To set the clearance of a subject or the classification of an object






33. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






34. Controls for termination of attempt to access object






35. Highest level of authority at EOC with knowledge of the business process and the resources available






36. Maintenance procedures outline the process for the review and update of business continuity plans.






37. Pertaining to law - accepted by a court






38. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






39. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






40. An attack involving the hijacking of a TCP session by predicting a sequence number.






41. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a hub).






42. A state where two subjects can access the same object without proper mediation






43. Program that inappropriately collects private data or activity






44. Pertaining to law - no omissions






45. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






46. Try a list of words in passwords or encryption keys






47. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






48. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






49. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






50. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.