Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






2. Information about a particular data set






3. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






4. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






5. Potentially compromising leakage of electrical or acoustical signals.






6. One way encryption






7. A backup of data located where staff can gain access immediately






8. A collection of information designed to reduce duplication and increase integrity






9. A group or network of honeypots






10. A one way - directed graph which indicates confidentiality or integrity flow






11. A comprehensive set of controls comprising best practices in information security and provides guidelines on how to set up and maintain security programs.






12. RADIUS - TACACS+ - Diameter






13. Regular operations are stopped and where processing is moved to the alternate site.






14. Record of system activity - which provides for monitoring and detection.






15. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






16. To execute more than one instruction at an instant in time






17. Control category - more than one control on a single asset






18. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






19. A Denial of Service attack that floods the target system with connection requests that are not finalized.






20. Initial surge of current






21. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






22. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






23. Intellectual property management technique for identifying after distribution






24. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






25. Is secondhand and usually not admissible in court






26. OOP concept of an object at runtime






27. Asymmetric encryption of a hash of message






28. Line noise that is superimposed on the supply circuit.






29. To create a copy of data as a precaution against the loss or damage of the original data.






30. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






31. Unauthorized wireless network access device.






32. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






33. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






34. For PKI - to store another copy of a key






35. High level - pertaining to planning






36. A risk assessment method - measurable real money cost






37. Moving the alphabet intact a certain number spaces






38. An image compression standard for photographs






39. May be responsible for overall recovery of an organization or unit(s).






40. Quantity of risk remaining after a control is applied






41. A process state - (blocked) needing input before continuing






42. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






43. Identification and notification of an unauthorized and/or undesired action






44. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






45. Recording the Who What When Where How of evidence






46. A state for operating system tasks only






47. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






48. A device that converts between digital and analog representation of data.






49. Small data files written to a user's hard drive by a web server.






50. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.