Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Calculation encompassing threats - vulnerabilities and assets






2. Searching for wireless networks in a moving car.






3. A control before attack






4. OOP concept of a template that consist of attributes and behaviors






5. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






6. A planned or unplanned interruption in system availability.






7. Individuals - normally managers or directors - who have responsibility .for the integrity - accurate reporting and use of computerized data.






8. To evaluate the current situation and make basic decisions as to what to do






9. A computer designed for the purpose of studying adversaries






10. Converts source code to an executable






11. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






12. One way encryption






13. Hardware or software that is part of a larger system






14. A type of multitasking that allows for more even distribution of computing time among competing request






15. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






16. Reduction of voltage by the utility company for a prolonged period of time






17. Communicate to stakeholders






18. Evidence must be: admissible - authentic - complete - accurate - and convincing






19. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






20. Line by line translation from a high level language to machine code






21. Amount of time for restoring a business process or function to normal operations without major loss






22. A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0" component of the binary code.






23. To load the first piece of software that starts a computer.






24. Memory management technique which allows data to be moved from one memory address to another






25. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






26. Requirement to take time off






27. Recognition of an individual's assertion of identity.






28. A system that enforces an access control policy between two networks.






29. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






30. The guardian of asset(s) - a maintenance activity






31. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






32. An asymmetric cryptography mechanism that provides authentication.






33. Use of specialized techniques for recovery - authentication - and analysis of electronic data






34. A device that provides the functions of both a bridge and a router.






35. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






36. To segregate for the purposes of labeling






37. Weakness or flaw in an asset






38. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






39. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






40. Systems whose incapacity or destruction would have a debilitating impact on the economic security of an organization - community - nation - etc






41. An exact bit-by-bit copy of the entire physical hard drive or floppy disk - including slack and unallocated space. Only forensic copy quality will hold up in court.






42. OOP concept of an object at runtime






43. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






44. A database backup type which records at the transaction level






45. Joining two pieces of text






46. One method of exercising teams in which participants are challenged to determine the actions they would take in the event of a specific disaster scenario. Mock disasters usually involve all - or most - of the applicable teams.






47. A backup type - for databases at a point in time






48. Mediation of subject and object interactions






49. A backup type which creates a complete copy






50. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.