Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Outputs within a given function are the same result






2. Another subject cannot see an ongoing or pending update until it is complete






3. The managerial approval to operate a system based upon knowledge of risk to operate






4. Pertaining to law - lending it self to one side of an argument






5. Total number of keys available that may be selected by the user of a cryptosystem






6. Attempts to assign real and meaningful numbers to all elements of the risk analysis process.






7. Responsibility of a user for the actions taken by their account which requires unique identification






8. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.






9. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






10. A back up type - where the organization has excess capacity in another location.






11. The process of logging changes or updates to a database since the last full backup. Journals can be used to recover previous versions of a file before updates were made - or to facilitate disaster recovery.






12. Prolonged loss of commercial power






13. Individuals and departments responsible for the storage and safeguarding of computerized data.






14. Final purpose or result






15. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






16. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






17. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






18. A Denial of Service attack that floods the target system with connection requests that are not finalized.






19. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






20. Controls deployed to avert unauthorized and/or undesired actions.






21. The past internationally accepted set of standards and processes for information security products evaluation and assurance - which separates function and assurance requirements






22. A system that enforces an access control policy between two networks.






23. Of a system without prior knowledge by the tester or the tested






24. Vehicle or tool that exploits a weakness






25. Trading one for another






26. Layer 1 network device that is used to connect network segments together - but provides no traffic control (a concentrator).






27. Subject based description of a system or a collection of resources






28. A copy of transaction data - designed for querying and reporting






29. A process state - to be either be unable to run waiting for an external event or terminated






30. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






31. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






32. Memory management technique which allows data to be moved from one memory address to another






33. Someone who want to know how something works - typically by taking it apart






34. A group of hard drives working as one storage unit for the purpose of speed and fault tolerance






35. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






36. Renders the file inaccessible to the operating system - available to reuse for data storage.






37. Process of statistically testing a data set for the likelihood of relevant information.






38. Pertaining to law - verified as real






39. A layer 2 device that used to connect two or more network segments and regulate traffic.






40. High degree of visual control






41. Regular operations are stopped and where processing is moved to the alternate site.






42. The core of a computer that calculates






43. The problems solving state - the opposite of supervisor mode






44. Methodical research of an incident with the purpose of finding the root cause






45. A collection of information designed to reduce duplication and increase integrity






46. Amount of time for restoring a business process or function to normal operations without major loss






47. What is will remain - persistence






48. A one way - directed graph which indicates confidentiality or integrity flow






49. Electronically forwarding backup data to an offsite server or storage facility. Vaulting eliminates the need for tape shipment and therefore significantly shortens the time required to move the data offsite.






50. A layer 3 device that used to connect two or more network segments and regulate traffic.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests