Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Control category- to discourage an adversary from attempting to access






2. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






3. Deals with discretionary protection






4. A device that converts between digital and analog representation of data.






5. Lower frequency noise






6. A database that contains the name - type - range of values - source and authorization for access for each data element






7. Weak evidence






8. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






9. Creation distribution update and deletion






10. Collection of data on business functions which determines the strategy of resiliency






11. Momentary loss of power






12. A Denial of Service attack that floods the target system with connection requests that are not finalized.






13. Recording the Who What When Where How of evidence






14. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






15. The core of a computer that calculates






16. The connection between a wireless and wired network.






17. Uses two or more legal systems






18. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






19. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






20. Impossibility of denying authenticity and identity






21. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.






22. Unauthorized wireless network access device.






23. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.






24. Record history of incident






25. To execute more than one instruction at an instant in time






26. Process of statistically testing a data set for the likelihood of relevant information.






27. High level - pertaining to planning






28. Potentially compromising leakage of electrical or acoustical signals.






29. A process state - to be either be unable to run waiting for an external event or terminated






30. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






31. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






32. Uncleared buffers or media






33. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






34. Threats x Vulnerability x Asset Value = Total Risk






35. A process state - to be executing a process on the CPU






36. Unauthorized access of network devices.






37. The technical and risk assesment of a system within the context of the operating environment






38. Calculation encompassing threats - vulnerabilities and assets






39. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






40. Control category- to record an adversary's actions






41. A planned or unplanned interruption in system availability.






42. Memory management technique that allows two processes to run concurrently without interaction






43. Trading one for another






44. Reprogrammable basic startup instructions






45. A secure connection to another network.






46. A condition in which neither party is willing to stop their activity for the other to complete






47. High frequency noise






48. A race condition where the security changes during the object's access






49. Statistical probabilities of a collision are more likely than one thinks






50. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.