Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






2. Evidence must be: admissible - authentic - complete - accurate - and convincing






3. Are bound to objects and indicate what subjects can use them - typically kept by a network device (router - switch and so on) to control access to or from the device for a number of services






4. The technical and risk assesment of a system within the context of the operating environment






5. The core logic engine of an operating system which almost never changes






6. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






7. An ongoing program supported and funded by executive staff to ensure business continuity requirements are assessed - resources are allocated and - recovery and continuity strategies and procedures are completed and tested.






8. Uses a role-based method to determine access rights and permissions. Role based access control is based on the user's role and responsibilities within the company.






9. Business and technical process of applying security software updates in a regulated periodic way






10. Malware that makes many small changes over time to a single data point or system






11. A structured group of teams ready to take control of the recovery operations if a disaster should occur.






12. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






13. Measures followed to restore critical functions following a security incident.






14. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






15. An access policy that uses a security label system. Users have clearances - and resources have security labels that contain data classifications. MAC compares these two attributes to determine access control capabilies - most commonly used in governm






16. One way encryption






17. Vehicle stopping object






18. A documented battle plan for coordinating response to incidents.






19. A computer designed for the purpose of studying adversaries






20. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






21. A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.






22. System of law based upon what is good for society






23. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






24. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






25. A simple - inexpensive cabling technology consisting of two conductors that are wound together to decrease interference.






26. To load the first piece of software that starts a computer.






27. Alerts personnel to the presence of a fire






28. An access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have - most commonly used in the PC environment (i.e. file permissions).






29. Define the way in which the organization operates.






30. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






31. An event which stops business from continuing.






32. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






33. Line noise that is superimposed on the supply circuit.






34. Scrambled form of the message or data






35. System of law based upon precedence - with major divisions of criminal - tort - and administrative






36. Induces a crime - tricks a person - and is illegal






37. Intellectual property protection for an confidential and critical process






38. Data or interference that can trigger a false positive






39. A specification for wireless Metropolitan Area Networks (IEEE 802.16) that provides an alternative to the use of cable and DSL for last mile delivery.






40. Threats x Vulnerability x Asset Value = Total Risk






41. An unintended communication path






42. Requires two of the three user authentication attributes (knows - is or has) - e.g. you have an ATM card and enter a PIN






43. The response of an organization to a disaster or other significant event that may significantly impact the organization - its people - or its ability to function productively.






44. Try a list of words in passwords or encryption keys






45. A backup of data located where staff can gain access immediately






46. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






47. Transaction controls for a database - a return to a previous state






48. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






49. Recovery alternative - everything needed for the business function - except people and last backup






50. Intermediate level - pertaining to planning







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests