Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A mathematical tool for verifying no unintentional changes have been made






2. The study of cryptography and cryptanalysis






3. To move from location to location - keeping the same function






4. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






5. A collection of data or information that has a name






6. Record history of incident






7. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






8. A value an organization places on an IDS based on past performance and analysis to help determine its ability to effectively identify an attack






9. Objects or programming that looks the different but act same






10. Alerts personnel to the presence of a fire






11. To load the first piece of software that starts a computer.






12. Evaluation of a system without prior knowledge by the tester






13. An asymmetric cryptography mechanism that provides authentication.






14. A program in the operating system responsible for maintaining the hierarchical storage relocation requirements for processes and data from RAM to hard drives






15. A trusted issuer of digital certificates






16. Organization way of classifying data by factors such as criticality - sensitivity and ownership.






17. A back up type - where the organization has excess capacity in another location.






18. A layer 2 device that used to connect two or more network segments and regulate traffic.






19. One method of testing a specific component of a plan. Typically - a team member makes a detailed presentation of the component to other team members (and possibly non-members) for their critique and evaluation.






20. Disruption of operation of an electronic device due to a competing electromagnetic field.






21. A failure of an IDS to detect an actual attack






22. Joining two pieces of text






23. Representatives from each functional area or department get together and walk through the plan from beginning to end.






24. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






25. A risk assessment method - intrinsic value






26. Part of a transaction control for a database which informs the database of the last recorded transaction






27. Control category- to give instructions or inform






28. Use of specialized techniques for recovery - authentication - and analysis of electronic data






29. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






30. Eavesdropping on network communications by a third party.






31. The core of a computer that calculates






32. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






33. The principles a person sets for themselves to follow






34. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






35. Memory management technique which allows data to be moved from one memory address to another






36. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






37. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






38. Mediation of covert channels must be addressed






39. A Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. (See Smurf)






40. Identification and notification of an unauthorized and/or undesired action






41. Memory management technique which allows subjects to use the same resource






42. To reduce sudden rises in current






43. A programming design concept which abstracts one set of functions from another in a serialized fashion






44. To break a business process into separate functions and assign to different people






45. Responsibility of a user for the actions taken by their account which requires unique identification






46. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






47. A form of data hiding which protects running threads of execution from using each other's memory






48. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






49. A database backup type which records at the transaction level






50. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions