Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The hard drive






2. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






3. Responsibility for actions






4. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






5. Using small special tools all tumblers of the lock are aligned - opening the door






6. Summary of a communication for the purpose of integrity






7. A subnetwork with storage devices servicing all servers on the attached network.






8. Organization's prior arrangements made to maintain the functions and processes important to the existence of the organization






9. Controls deployed to avert unauthorized and/or undesired actions.






10. Scrambled form of the message or data






11. Malware that subverts the detective controls of an operating system






12. Moving letters around






13. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






14. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






15. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






16. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






17. Implementation of measures to deter specific threats to the continuity of business operations - and/or respond to any occurrence of such threats in a timely and appropriate manner.






18. One of the key benefits of a network is the ability to share files stored on the server among several users.






19. Intellectual property protection for marketing efforts






20. To segregate for the purposes of labeling






21. More than one CPU on a single board






22. Act of luring an intruder and is legal.






23. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






24. To start business continuity processes






25. OOP concept of an object at runtime






26. Physical description on the exterior of an object that communicates the existence of a label






27. Maintaining full control over requests - implementation - traceability - and proper documentation of changes.






28. Claiming another's identity at a physical level






29. Long term knowledge building






30. Data or interference that can trigger a false positive






31. A choice in risk management - to implement a control that limits or lessens negative effects






32. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






33. Location to perform the business function






34. Two different keys decrypt the same cipher text






35. People protect their domain






36. The collection and summation of risk data relating to a particular asset and controls for that asset






37. Define the way in which the organization operates.






38. A basic level of network access control that is based upon information contained in the IP packet header.






39. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






40. Malware that makes small random changes to many data points






41. An unintended communication path






42. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






43. A practice execution of the plan takes place. A specific scenario is established - and the simulation continues up to the point of actual relocation to the alternate site.






44. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






45. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






46. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






47. Recovery alternative which outsources a business function at a cost






48. Threats x Vulnerability x Asset Value = Total Risk






49. A electronic attestation of identity by a certificate authority






50. Requirement of access to data for a clearly defined purpose