Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Trading one for another






2. To load the first piece of software that starts a computer.






3. A control before attack






4. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






5. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






6. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






7. Inappropriate data






8. Recovery alternative - a building only with sufficient power - and HVAC






9. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






10. Controls for termination of attempt to access object






11. Less granular organization of controls -






12. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






13. Just enough access to do the job






14. A program with an inappropriate second purpose






15. Control category- to restore to a previous state by removing the adversary and or the results of their actions






16. Substitution at the word or phrase level






17. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






18. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






19. Hitting a filed down key in a lock with a hammer to open without real key






20. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






21. Eight bits.






22. Abstract and mathematical in nature - defining all possible states - transitions and operations






23. May be responsible for overall recovery of an organization or unit(s).






24. Real-time - automatic and transparent backup of data.






25. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






26. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






27. Initial surge of current






28. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






29. A basic level of network access control that is based upon information contained in the IP packet header.






30. Location where coordination and execution of BCP or DRP is directed






31. Consume resources to a point of exhaustion - loss of availability






32. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






33. Granular decision by a system of permitting or denying access to a particular resource on the system






34. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






35. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






36. Reprogrammable basic startup instructions






37. Using many alphabets






38. The first rating that requires security labels






39. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






40. Mitigate damage by isolating compromised systems from the network.






41. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






42. A passive network attack involving monitoring of traffic.






43. Highest level of authority at EOC with knowledge of the business process and the resources available






44. Real-time data backup ( Data Mirroring)






45. Requirement of access to data for a clearly defined purpose






46. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






47. Specific format of technical and physical controls that support the chosen framework and the architecture






48. Code making






49. To move from location to location - keeping the same function






50. OOP concept of a distinct copy of the class