Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A distributed system's transaction control that requires updates to complete or rollback






2. A planned or unplanned interruption in system availability.






3. Recovery alternative - a building only with sufficient power - and HVAC






4. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






5. The guardian of asset(s) - a maintenance activity






6. To collect many small pieces of data






7. Server optimized for providing file-based data storage to the network. Unlike a File Server - a NAS unit has no input or output devices - and the OS is dedicated for providing storage services.






8. Representatives from each functional area or department get together and walk through the plan from beginning to end.






9. Control type- that is communication based - typically written or oral






10. Evidence must be: admissible - authentic - complete - accurate - and convincing






11. Rapid switching back and forth between programs from the computer's perspective and appearing to do more that one thing at a time from the user's perspective






12. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






13. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






14. A trusted issuer of digital certificates






15. An event which stops business from continuing.






16. Memory management technique which allows data to be moved from one memory address to another






17. Share security concerns with embedded devices - Often security has been scarified for richer user experience during low power - Prime target for data loss as they transmit and store information in ways that can't be controlled.






18. Malware that subverts the detective controls of an operating system






19. A layer 2 device that used to connect two network segments and regulate traffic.






20. OOP concept of a distinct copy of the class






21. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






22. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






23. Malware that uses the trust on a website to redirect users to untrusted websites which captures data or installs more malware






24. OOP concept of a taking attributes from the original or parent






25. Specific format of technical and physical controls that support the chosen framework and the architecture






26. People who interact with assets






27. Pertaining to law - high degree of veracity






28. Amount of time for restoring a business process or function to normal operations without major loss






29. A choice in risk management - to implement a control that limits or lessens negative effects






30. Regular operations are stopped and where processing is moved to the alternate site.






31. A documented battle plan for coordinating response to incidents.






32. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






33. Potentially compromising leakage of electrical or acoustical signals.






34. To move from location to location - keeping the same function






35. Deals with discretionary protection






36. Independent malware that requires user interaction to execute






37. Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public.






38. Summary of a communication for the purpose of integrity






39. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






40. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






41. May be responsible for overall recovery of an organization or unit(s).






42. Intellectual property protection for marketing efforts






43. Long term knowledge building






44. One of the most widely supported file formats for storing bit-mapped images. Files in TIFF format often end with a .tif extension.






45. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






46. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






47. The level and label given to an individual for the purpose of compartmentalization






48. A type a computer memory that temporarily stores frequently used information for quick access.






49. Transaction controls for a database - a return to a previous state






50. A process state - (blocked) needing input before continuing







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests