Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The chance that something negative will occur






2. A record that must be preserved and available for retrieval if needed.






3. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






4. Eavesdropping on network communications by a third party.






5. What is will remain - persistence






6. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






7. Line by line translation from a high level language to machine code






8. A documented battle plan for coordinating response to incidents.






9. OOP concept of an object's abilities - what it does






10. Control category - more than one control on a single asset






11. A layer 2 device that used to connect two network segments and regulate traffic.






12. A secure connection to another network.






13. A risk assessment method - intrinsic value






14. The partial or full duplication of data from a source database to one or more destination databases.






15. A signal suggesting a system has been or is being attacked.






16. Controls deployed to avert unauthorized and/or undesired actions.






17. A cable consisting of a core - inner conductor that is surrounding by an insulator - an outer cylindrical conductor






18. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






19. RADIUS - TACACS+ - Diameter






20. A protocol for the efficient transmission of voice over the Internet






21. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






22. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






23. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






24. Employment education done once per position or at significant change of function






25. Most granular organization of controls






26. A electronic attestation of identity by a certificate authority






27. Pertaining to law - lending it self to one side of an argument






28. Potentially compromising leakage of electrical or acoustical signals.






29. Granular decision by a system of permitting or denying access to a particular resource on the system






30. Converts source code to an executable






31. Effort/time needed to overcome a protective measure






32. Collection of data on business functions which determines the strategy of resiliency






33. The ability an IDS has to dynamically change its rules and configurations in response to changing environmental activity






34. An image compression standard for photographs






35. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






36. For PKI - to store another copy of a key






37. A process state - to be executing a process on the CPU






38. Communicate to stakeholders






39. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






40. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






41. A design methodology which executes in a linear one way fashion






42. Control type- that is communication based - typically written or oral






43. High level design or model with a goal of consistency - integrity - and balance






44. Converts a high level language into machine language






45. Unchecked data which spills into another location in memory






46. A risk assessment method - measurable real money cost






47. Process whereby data is removed from active files and other data storage structures






48. Deals with discretionary protection






49. The guardian of asset(s) - a maintenance activity






50. A collection of data or information that has a name