Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






2. State of computer - to be running a process






3. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






4. Responsibility of a user for the actions taken by their account which requires unique identification






5. Two certificate authorities that trust each other






6. A device that provides the functions of both a bridge and a router.






7. May be responsible for overall recovery of an organization or unit(s).






8. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






9. Weakness or flaw in an asset






10. Subset of operating systems components dedicated to protection mechanisms






11. OOP concept of a class's details to be hidden from object






12. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






13. Summary of a communication for the purpose of integrity






14. Hitting a filed down key in a lock with a hammer to open without real key






15. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






16. Someone who wants to cause harm






17. An attack involving the hijacking of a TCP session by predicting a sequence number.






18. Ertaining to a number system that has just two unique digits.






19. Potentially retrievable data residue that remains following intended erasure of data.






20. Recovery alternative - short-term - high cost movable processing location






21. Reduction of voltage by the utility company for a prolonged period of time






22. Physical description on the exterior of an object that communicates the existence of a label






23. Planning with a goal of returning to the normal business function






24. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






25. A hash that has been further encrypted with a symmetric algorithm






26. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






27. Vehicle stopping object






28. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






29. System mediation of access with the focus on the context of the request






30. Evidence must be: admissible - authentic - complete - accurate - and convincing






31. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






32. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






33. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






34. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






35. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






36. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






37. Unsolicited commercial email






38. Joining two pieces of text






39. A backup of data located where staff can gain access immediately






40. Pertaining to law - verified as real






41. Provides a physical cross connect point for devices.






42. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






43. People protect their domain






44. Converts a high level language into machine language






45. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






46. OOP concept of a taking attributes from the original or parent






47. Memory management technique which allows subjects to use the same resource






48. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






49. A device that converts between digital and analog representation of data.






50. Amount of time for restoring a business process or function to normal operations without major loss