Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides a physical cross connect point for devices.






2. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






3. Someone who want to know how something works - typically by taking it apart






4. Sphere of influence






5. Return to a normal state






6. Fault tolerance for power






7. To load the first piece of software that starts a computer.






8. DoS - Spoofing - dictionary - brute force - wardialing






9. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






10. Vehicle or tool that exploits a weakness






11. A type a computer memory that temporarily stores frequently used information for quick access.






12. A set of best practices for programmers to seek in all application or data base design: Atomicity - Consistency - Isolation - Durability






13. A tag of three or four letters - preceded by a period - which identifies a data file's format or the application used to create the file.






14. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






15. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






16. Dedicated fast memory located on the same board as the CPU






17. For PKI - to store another copy of a key






18. A risk assessment method - measurable real money cost






19. Control category - more than one control on a single asset






20. To move from location to location - keeping the same function






21. Unsolicited advertising software






22. Hardware or software that is part of a larger system






23. A layer 2 device that used to connect two network segments and regulate traffic.






24. The duplication of data for purposes of backup or to distribute network traffic among several computers with identical data.






25. A template for the designing the architecture






26. Code making






27. A backup type which creates a complete copy






28. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






29. A telephone exchange for a specific office or business.






30. Controls for termination of attempt to access object






31. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






32. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






33. Intellectual property protection for marketing efforts






34. A program with an inappropriate second purpose






35. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.






36. Program instructions based upon the CPU's specific architecture






37. Using small special tools all tumblers of the lock are aligned - opening the door






38. Physical description on the exterior of an object that communicates the existence of a label






39. State of computer - to be running a process






40. Collection of data on business functions which determines the strategy of resiliency






41. Need to understand both the assets that need to be protected and management's priorities - Also be prepared to adjust the design over time - and verify the design has been implemented correctly - need to be good negotiator - artist and analyst.






42. A world-wide wireless technology






43. Of a system without prior knowledge by the tester or the tested






44. High level - pertaining to planning






45. High frequency - highly directional radio signals. Attackers target interception attempts at transmission and relay stations.






46. OOP concept of a template that consist of attributes and behaviors






47. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






48. Not fulfilling legally recognized obligation - failure to conform to a standard of care that results in injury or damage - and proximate causation - not practicing due diligence - or due care - not following prudent person (doing due diligence in due






49. Recovery alternative - complete duplication of services including personnel






50. A type of multitasking that allows for more even distribution of computing time among competing request