Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






2. Measures followed to restore critical functions following a security incident.






3. Record of system activity - which provides for monitoring and detection.






4. Use of specialized techniques for recovery - authentication - and analysis of electronic data






5. Line by line translation from a high level language to machine code






6. OOP concept of a taking attributes from the original or parent






7. A device that converts between digital and analog representation of data.






8. Short period of low voltage.






9. More than one CPU on a single board






10. A social engineering attack that uses spoofed email or websites to persuade people to divulge information.






11. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






12. Continuous surveillance - to provide for detection and response of any failure in preventive controls.






13. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






14. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






15. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






16. A process state - to be either be unable to run waiting for an external event or terminated






17. Program that inappropriately collects private data or activity






18. Scrambled form of the message or data






19. Code making






20. OOP concept of an object's abilities - what it does






21. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






22. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






23. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






24. Subject based description of a system or a collection of resources






25. Written internalized or nationalized norms that are internal to an organization






26. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






27. The risk that remains after management implements internal controls - or some other response to risk - (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk






28. OOP concept of a template that consist of attributes and behaviors






29. The technical and risk assesment of a system within the context of the operating environment






30. Identification and notification of an unauthorized and/or undesired action






31. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






32. For PKI - to have more than one person in charge of a sensitive function






33. Something that happened






34. The core of a computer that calculates






35. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






36. Recording activities at the keyboard level






37. Unsolicited commercial email






38. Natural occurrence in circuits that are in close proximity






39. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






40. Requirement of access to data for a clearly defined purpose






41. To reduce fire






42. A passive network attack involving monitoring of traffic.






43. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






44. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






45. An availability attack - to consume resources to the point of exhaustion from multiple vectors






46. A backup of data located where staff can gain access immediately






47. The connection between a wireless and wired network.






48. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






49. Inappropriate data






50. A system that enforces an access control policy between two networks.