Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A type of attack involving attempted insertion - deletion or altering of data.






2. Memory management technique which allows data to be moved from one memory address to another






3. Information which has retained its importance - but which has been created or stored by software/hardware that has been rendered obsolete.






4. Those who initiate the attack






5. Pertaining to law - no omissions






6. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






7. OOP concept of an object at runtime






8. A choice in risk management - to implement a control that limits or lessens negative effects






9. A database backup type which records at the transaction level






10. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.






11. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






12. Encryption system using a pair of mathematically related unequal keys






13. The property that data meet with a priority expectation of quality and that the data can be relied upon.






14. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






15. A signal suggesting a system has been or is being attacked.






16. All of the protection mechanism in a computer system






17. System of law based upon what is good for society






18. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






19. A risk assessment method - intrinsic value






20. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






21. Summary of a communication for the purpose of integrity






22. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






23. A vulnerability in IP that allows an attacker to dictate the path of a communication and thereby access an internal network.






24. Lower frequency noise






25. To jump to a conclusion






26. Specific format of technical and physical controls that support the chosen framework and the architecture






27. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






28. The hardware and software mediator of all subject and object interactions which has as its primary goal security policy enforcement.






29. System mediation of access with the focus on the context of the request






30. A choice in risk management - to convince another to assume risk - typically by payment






31. A planned or unplanned interruption in system availability.






32. A programming design concept which abstracts one set of functions from another in a serialized fashion






33. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






34. Hiding the fact that communication has occurred






35. A backup type which creates a complete copy






36. A secure connection to another network.






37. An availability attack - to consume resources to the point of exhaustion from multiple vectors






38. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






39. A process state - (blocked) needing input before continuing






40. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






41. The chronological sequence of recovery activities - or critical path - that must be followed to resume an acceptable level of operations following a business interruption.






42. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






43. A backup of data located where staff can not gain access readily and a regional disaster will not cause harm






44. The level and label given to an individual for the purpose of compartmentalization






45. Abstract and mathematical in nature - defining all possible states - transitions and operations






46. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






47. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






48. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






49. The guardian of asset(s) - a maintenance activity






50. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.