Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A mobilized resource purchased or contracted for the purpose of business recovery.






2. A collection of data or information that has a name






3. Review of data






4. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






5. To segregate for the purposes of labeling






6. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






7. A set of laws that the organization agrees to be bound by






8. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






9. Eight bits.






10. Maintenance procedures outline the process for the review and update of business continuity plans.






11. People protect their domain






12. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






13. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






14. Reduces causes of fire






15. False memory reference






16. A basic level of network access control that is based upon information contained in the IP packet header.






17. Intellectual property protection for an confidential and critical process






18. Creation distribution update and deletion






19. Identification and notification of an unauthorized and/or undesired action






20. Long term knowledge building






21. OOP concept of an object's abilities - what it does






22. Planning for the delegation of authority required when decisions must be made without the normal chain of command






23. Forgery of the sender's email address in an email header.






24. Reprogrammable basic startup instructions






25. Pertaining to law - lending it self to one side of an argument






26. May be responsible for overall recovery of an organization or unit(s).






27. Pertaining to law - verified as real






28. Line by line translation from a high level language to machine code






29. Actions measured against either a policy or what a reasonable person would do






30. Communication of a security incident to stakeholders and data owners.






31. A temporary public file to inform others of a compromised digital certificate






32. Low level - pertaining to planning






33. A physical enclosure for verifying identity before entry to a facility






34. A Denial of Service attack that floods the target system with connection requests that are not finalized.






35. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






36. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






37. A computer designed for the purpose of studying adversaries






38. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






39. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






40. Potentially compromising leakage of electrical or acoustical signals.






41. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






42. Hitting a filed down key in a lock with a hammer to open without real key






43. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






44. The study of cryptography and cryptanalysis






45. Controls for logging and alerting






46. A record that must be preserved and available for retrieval if needed.






47. Act of scrambling the cleartext message by using a key.






48. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






49. Controls for termination of attempt to access object






50. Induces a crime - tricks a person - and is illegal