Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Summary of a communication for the purpose of integrity






2. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






3. Binary decision by a system of permitting or denying access to the entire system






4. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






5. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






6. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






7. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






8. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






9. A signal suggesting a system has been or is being attacked.






10. Prolonged loss of commercial power






11. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






12. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






13. Consume resources to a point of exhaustion - loss of availability






14. For PKI - to store another copy of a key






15. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






16. Recovery alternative which includes cold site and some equipment and infrastructure is available






17. A technology that reduces the size of a file.






18. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






19. A process state - to be executing a process on the CPU






20. Pertaining to law - verified as real






21. OOP concept of a distinct copy of the class






22. To set the clearance of a subject or the classification of an object






23. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






24. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






25. A test that answers the questions: Does the organization have the documentation it needs? Can it be located?






26. False memory reference






27. A process state - (blocked) needing input before continuing






28. A control before attack






29. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






30. Moving the alphabet intact a certain number spaces






31. Descrambling the encrypted message with the corresponding key






32. System mediation of access with the focus on the context of the request






33. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






34. Transaction controls for a database - a return to a previous state






35. Security policy - procedures - and compliance enforcement






36. A choice in risk management - to convince another to assume risk - typically by payment






37. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






38. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






39. A state for operating system tasks only






40. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






41. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






42. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






43. An alert or alarm that is triggered when no actual attack has taken place






44. Dedicated fast memory located on the same board as the CPU






45. Disruption of operation of an electronic device due to a competing electromagnetic field.






46. Real-time - automatic and transparent backup of data.






47. A physical enclosure for verifying identity before entry to a facility






48. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






49. Alerts personnel to the presence of a fire






50. Control category- to discourage an adversary from attempting to access