Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An approach by an organization that will ensure its recovery and continuity in the face of a disaster or other major outage. Plans and methodologies are determined by the organizations strategy.






2. A set of laws that the organization agrees to be bound by






3. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






4. Recovery alternative which includes cold site and some equipment and infrastructure is available






5. Location to perform the business function






6. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






7. Forging of an IP address.






8. Deals with discretionary protection






9. Act of luring an intruder and is legal.






10. Less granular organization of controls -






11. Text that does not include special formatting features and therefore can be exchanged and read by most computer systems






12. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






13. Of a system without prior knowledge by the tester or the tested






14. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






15. A group of individuals responsible for maintaining the business recovery procedures and coordinating the recovery of business functions and processes.






16. A system designed to prevent unauthorized access to or from a private network.






17. Intellectual property protection for an confidential and critical process






18. Small data warehouse






19. OOP concept of an object's abilities - what it does






20. Statistical probabilities of a collision are more likely than one thinks






21. Pertaining to law - no omissions






22. A mobilized resource purchased or contracted for the purpose of business recovery.






23. Summary of a communication for the purpose of integrity






24. A covert storage channel on the file attribute






25. Power surge






26. Business and technical process of applying security software updates in a regulated periodic way






27. Another subject cannot see an ongoing or pending update until it is complete






28. Identification and notification of an unauthorized and/or undesired action






29. A condition in which neither party is willing to stop their activity for the other to complete






30. A programming device use in development to circumvent controls






31. Renders the record inaccessible to the database management system






32. Code breaking - practice of defeating the protective properties of cryptography.






33. RADIUS - TACACS+ - Diameter






34. The process of recovering a database to the point of failure by applying active journal or log data to the current backup files of the database.






35. Hiding the fact that communication has occurred






36. Reconnaissance technique - involving automated - brute force identification of potentially vulnerable modems.






37. A Trojan horse with the express underlying purpose of controlling host from a distance






38. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






39. Slang for making (burning) a CD-ROM copy of data - whether it is music - software - or other data.






40. Forgery of the sender's email address in an email header.






41. The managerial approval to operate a system based upon knowledge of risk to operate






42. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






43. Intellectual property protection for an invention






44. The level and label given to an individual for the purpose of compartmentalization






45. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






46. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






47. The connection between a wireless and wired network.






48. Evaluation of a system without prior knowledge by the tester






49. A telephone exchange for a specific office or business.






50. Interception of a communication session by an attacker.