Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recovery alternative which includes cold site and some equipment and infrastructure is available






2. A protocol for the efficient transmission of voice over the Internet






3. The technical and risk assesment of a system within the context of the operating environment






4. Moving the alphabet intact a certain number spaces






5. High level - pertaining to planning






6. A back up type - where the organization has excess capacity in another location.






7. The managerial approval to operate a system based upon knowledge of risk to operate






8. A subnetwork with storage devices servicing all servers on the attached network.






9. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






10. Written suggestions that direct choice to a few alternatives






11. For PKI - to store another copy of a key






12. The collection and summation of risk data relating to a particular asset and controls for that asset






13. A device that sequentially switches multiple analog inputs to the output.






14. To jump to a conclusion






15. A world-wide wireless technology






16. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






17. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






18. Process whereby data is removed from active files and other data storage structures






19. A template for the designing the architecture






20. A collection of data or information that has a name






21. A hash that has been further encrypted with a symmetric algorithm






22. A system designed to prevent unauthorized access to or from a private network.






23. A program with an inappropriate second purpose






24. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






25. A basic level of network access control that is based upon information contained in the IP packet header.






26. Hardware or software that is part of a larger system






27. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






28. To reduce sudden rises in current






29. Object reuse protection and auditing






30. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






31. A copy of transaction data - designed for querying and reporting






32. Policy or stated actions






33. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






34. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






35. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






36. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






37. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






38. System of law based upon what is good for society






39. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






40. Organized group of compromised computers






41. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






42. Intellectual property protection for an confidential and critical process






43. System Access - Network Architecture - Network Access - Encryption and Protocols - and Auditing






44. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






45. A choice in risk management - to implement a control that limits or lessens negative effects






46. An alert or alarm that is triggered when no actual attack has taken place






47. Scrambled form of the message or data






48. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






49. Collection of data on business functions which determines the strategy of resiliency






50. A process state - to be either be unable to run waiting for an external event or terminated