Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Eavesdropping on network communications by a third party.






2. A risk assessment method - measurable real money cost






3. Vehicle stopping object






4. A test conducted on one or more components of a plan under actual operating conditions.






5. More than one process in the middle of executing at a time






6. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






7. Final purpose or result






8. Collection of data on business functions which determines the strategy of resiliency






9. Tool which mediates access






10. Measures followed to restore critical functions following a security incident.






11. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






12. A layer 2 device that used to connect two network segments and regulate traffic.






13. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






14. Uncheck data input which results in redirection






15. Some systems are actually run at the alternate site






16. Data or interference that can trigger a false positive






17. A programming device use in development to circumvent controls






18. Power surge






19. A type of multitasking that allows for more even distribution of computing time among competing request






20. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






21. A unit of execution






22. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






23. A distributed system's transaction control that requires updates to complete or rollback






24. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






25. Something that happened






26. Representatives from each functional area or department get together and walk through the plan from beginning to end.






27. High degree of visual control






28. A mobilized resource purchased or contracted for the purpose of business recovery.






29. Used to code/decode a digital data stream.






30. With enough computing power trying all possible combinations






31. Subject based description of a system or a collection of resources






32. To load the first piece of software that starts a computer.






33. Planning with a goal of returning to the normal business function






34. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






35. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






36. Real-time - automatic and transparent backup of data.






37. To know more than one job






38. Define the way in which the organization operates.






39. Try a list of words in passwords or encryption keys






40. One way encryption






41. Controls deployed to avert unauthorized and/or undesired actions.






42. Short period of low voltage.






43. OOP concept of an object at runtime






44. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






45. For PKI - to store another copy of a key






46. Policy or stated actions






47. Object reuse protection and auditing






48. The first rating that requires security labels






49. Can be statistical (monitor behavior) or signature based (watch for known attacks)






50. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?