Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Searching for wireless networks in a moving car.






2. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






3. Maximum tolerance for loss of certain business function - basis of strategy






4. May be responsible for overall recovery of an organization or unit(s).






5. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






6. A one way - directed graph which indicates confidentiality or integrity flow






7. A condition in which neither party is willing to stop their activity for the other to complete






8. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






9. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






10. Used to code/decode a digital data stream.






11. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






12. A Denial of Service attack that floods the target system with connection requests that are not finalized.






13. Record history of incident






14. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






15. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






16. An activity that is performed for the purpose of training and conditioning team members - and improving their performance.






17. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






18. A formal announcement by pre-authorized personnel that a disaster or severe outage is predicted or has occurred and that triggers pre-arranged mitigating actions (e.g. A move to an alternate site.)






19. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






20. Code breaking - practice of defeating the protective properties of cryptography.






21. The property that data meet with a priority expectation of quality and that the data can be relied upon.






22. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






23. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






24. Planning for the delegation of authority required when decisions must be made without the normal chain of command






25. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






26. The technical and risk assesment of a system within the context of the operating environment






27. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






28. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






29. The process of assessing damage - following a disaster - to computer hardware - vital records - office facilities - etc. And determining what can be salvaged or restored and what must be replaced.






30. One entity with two competing allegiances






31. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






32. A software design technique for abstraction of a process






33. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






34. Someone who wants to cause harm






35. All of the protection mechanism in a computer system






36. Mitigation of system or component loss or interruption through use of backup capability.






37. High level - pertaining to planning






38. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






39. Lower frequency noise






40. Interception of a communication session by an attacker.






41. Pertaining to law - lending it self to one side of an argument






42. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






43. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






44. Regular operations are stopped and where processing is moved to the alternate site.






45. Intellectual property protection for an invention






46. Of a system without prior knowledge by the tester or the tested






47. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






48. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






49. Written step-by-step actions






50. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions