Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.






2. Responsibility for actions






3. Collection of data on business functions which determines the strategy of resiliency






4. Responsibility of a user for the actions taken by their account which requires unique identification






5. Amount of time for restoring a business process or function to normal operations without major loss






6. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






7. Converts a high level language into machine language






8. A condition in which neither party is willing to stop their activity for the other to complete






9. Unused storage capacity






10. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






11. Using many alphabets






12. A computer designed for the purpose of studying adversaries






13. A world-wide wireless technology






14. A collection of information designed to reduce duplication and increase integrity






15. A set of laws that the organization agrees to be bound by






16. A process state - to be either be unable to run waiting for an external event or terminated






17. A covert storage channel on the file attribute






18. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






19. The technical and risk assesment of a system within the context of the operating environment






20. Memory management technique that allows two processes to run concurrently without interaction






21. Review of data






22. An event that triggers an IDS to produce an alarm and react as though a real attack were in progress






23. A type a computer memory that temporarily stores frequently used information for quick access.






24. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






25. The study of cryptography and cryptanalysis






26. Someone who wants to cause harm






27. Provides a physical cross connect point for devices.






28. A device that provides the functions of both a bridge and a router.






29. Policy or stated actions






30. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






31. A software design technique for abstraction of a process






32. A physical enclosure for verifying identity before entry to a facility






33. Mediation of covert channels must be addressed






34. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






35. Regular operations are stopped and where processing is moved to the alternate site.






36. A back up type - where the organization has excess capacity in another location.






37. Recovery alternative - everything needed for the business function - except people and last backup






38. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






39. A collection of data or information that has a name






40. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






41. DoS - Spoofing - dictionary - brute force - wardialing






42. Evaluation of a system without prior knowledge by the tester






43. Mitigate damage by isolating compromised systems from the network.






44. Physical description on the exterior of an object that communicates the existence of a label






45. Reduces causes of fire






46. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






47. Most granular organization of controls






48. Pertaining to law - lending it self to one side of an argument






49. An unintended communication path






50. RADIUS - TACACS+ - Diameter