Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Outputs within a given function are the same result






2. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






3. Can be statistical (monitor behavior) or signature based (watch for known attacks)






4. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






5. Summary of a communication for the purpose of integrity






6. Scrambled form of the message or data






7. Act of scrambling the cleartext message by using a key.






8. Eavesdropping on network communications by a third party.






9. Using small special tools all tumblers of the lock are aligned - opening the door






10. A condition in which neither party is willing to stop their activity for the other to complete






11. High frequency noise






12. A back up type - where the organization has excess capacity in another location.






13. RADIUS - TACACS+ - Diameter






14. More than one CPU on a single board






15. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






16. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






17. Pertaining to law - no omissions






18. Moving the alphabet intact a certain number spaces






19. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






20. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






21. Forging of an IP address.






22. Identification and notification of an unauthorized and/or undesired action






23. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






24. Organized group of compromised computers






25. The principles a person sets for themselves to follow






26. System directed mediation of access with labels






27. For PKI - to store another copy of a key






28. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






29. A documented battle plan for coordinating response to incidents.






30. Moving letters around






31. An unintended communication path






32. A template for the designing the architecture






33. A covert storage channel on the file attribute






34. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






35. A world-wide wireless technology






36. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






37. A signal suggesting a system has been or is being attacked.






38. Review of data






39. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






40. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






41. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






42. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






43. A telephone exchange for a specific office or business.






44. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






45. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






46. A set of laws that the organization agrees to be bound by






47. Recording the Who What When Where How of evidence






48. With enough computing power trying all possible combinations






49. The chance that something negative will occur






50. Mathematical function that determines the cryptographic operations