Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Standard for the establishment - implementation - control - and improvement of the Information Security Management System






2. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






3. Inference about encrypted communications






4. A covert storage channel on the file attribute






5. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






6. People protect their domain






7. Control category- to record an adversary's actions






8. Maximum tolerance for loss of certain business function - basis of strategy






9. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






10. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






11. A distributed system's transaction control that requires updates to complete or rollback






12. Subset of operating systems components dedicated to protection mechanisms






13. Unchecked data which spills into another location in memory






14. To break a business process into separate functions and assign to different people






15. Code making






16. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






17. Binary decision by a system of permitting or denying access to the entire system






18. High degree of visual control






19. A condition in which neither party is willing to stop their activity for the other to complete






20. Memory management technique that allows two processes to run concurrently without interaction






21. A test conducted on one or more components of a plan under actual operating conditions.






22. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






23. Information that - if made public or even shared around the organization - could seriously impede the organization's operations






24. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






25. Control category- to give instructions or inform






26. Location to perform the business function






27. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






28. Act of luring an intruder and is legal.






29. Forging of an IP address.






30. Written core statements that rarely change






31. Recording the Who What When Where How of evidence






32. Employment education done once per position or at significant change of function






33. A technology that reduces the size of a file.






34. Collection of data on business functions which determines the strategy of resiliency






35. A signal suggesting a system has been or is being attacked.






36. High frequency noise






37. Two certificate authorities that trust each other






38. More than one process in the middle of executing at a time






39. A collection of information designed to reduce duplication and increase integrity






40. Unauthorized wireless network access device.






41. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






42. Converts a high level language into machine language






43. Malware that makes small random changes to many data points






44. A risk assessment method - measurable real money cost






45. A program with an inappropriate second purpose






46. Specific format of technical and physical controls that support the chosen framework and the architecture






47. Searching for wireless networks in a moving car.






48. To move from location to location - keeping the same function






49. Guidelines within an organization that control the rules and configurations of an IDS






50. Event(s) that cause harm







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests