Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Fragmented data is live data that has been broken up and stored in various locations on a single hard drive or disk.






2. Owner directed mediation of access






3. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






4. To smooth out reductions or increases in power






5. Granular decision by a system of permitting or denying access to a particular resource on the system






6. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






7. A process state - to be either be unable to run waiting for an external event or terminated






8. Program that inappropriately collects private data or activity






9. Small data warehouse






10. Renders the file inaccessible to the operating system - available to reuse for data storage.






11. Those who initiate the attack






12. Sphere of influence






13. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






14. Forging of an IP address.






15. A Denial of Service attack initiated by sending spoofed ICMP echo request to IP broadcast addresses. (See Fraggle)






16. An individuals conduct that violates government laws developed to protect the public






17. Code making






18. What is will remain - persistence






19. A programming device use in development to circumvent controls






20. Unchecked data which spills into another location in memory






21. Evidence must be: admissible - authentic - complete - accurate - and convincing






22. Lower frequency noise






23. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






24. Organized group of compromised computers






25. A software design technique for abstraction of a process






26. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






27. Motive - opportunity - and means; when looking for suspects it is important to consider these 3 things






28. Natural or human-readable form of message






29. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






30. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






31. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






32. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






33. To assert or claim credentialing to an authentication system






34. The collection and summation of risk data relating to a particular asset and controls for that asset






35. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






36. Power surge






37. Return to a normal state






38. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






39. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware






40. Mitigation of spamming and other attacks by delaying incoming connections as long as possible.






41. OOP concept of an object's abilities - what it does






42. Final purpose or result






43. One way encryption






44. The technical and risk assesment of a system within the context of the operating environment






45. A unit of execution






46. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






47. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






48. An unintended communication path






49. Control type- that is communication based - typically written or oral






50. A group or network of honeypots