Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The guardian of asset(s) - a maintenance activity






2. Define the way in which the organization operates.






3. Real-time data backup ( Data Mirroring)






4. Try a list of words in passwords or encryption keys






5. Object based description of a system or a collection of resources






6. Policy or stated actions






7. An event which stops business from continuing.






8. Record history of incident






9. Information residing on computer systems - that is readily visible to the operating system with which it was created and is immediately accessible to users without deletion - modification or reconstruction.






10. Vehicle or tool that exploits a weakness






11. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.






12. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






13. Control category- to give instructions or inform






14. Just enough access to do the job






15. A backup type which creates a complete copy






16. High level - pertaining to planning






17. An application that is essential to the organization's ability to perform necessary business functions. Loss of the mission-critical application would have a negative impact on the business - as well as legal or regulatory impacts.






18. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.






19. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






20. The connection between a wireless and wired network.






21. A programming device use in development to circumvent controls






22. Potential danger to information or systems






23. A planned or unplanned interruption in system availability.






24. For PKI - to have more than one person in charge of a sensitive function






25. Data or interference that can trigger a false positive






26. Unused storage capacity






27. Memory management technique which allows subjects to use the same resource






28. Object based description of a single resource and the permission each subject






29. Maintenance procedures outline the process for the review and update of business continuity plans.






30. People protect their domain






31. Use of specialized techniques for recovery - authentication - and analysis of electronic data






32. Impossibility of denying authenticity and identity






33. Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.






34. Inappropriate data






35. Effort/time needed to overcome a protective measure






36. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






37. A list of team members and/or key players to be contacted including their backups. The list will include the necessary contact information (i.e. Home phone - pager - cell - etc.) And in most cases be considered confidential.






38. A mail server that improperly allows inbound SMTP connections for domains it does not serve.






39. A state for operating system tasks only






40. To evaluate the current situation and make basic decisions as to what to do






41. Control category- to record an adversary's actions






42. Line by line translation from a high level language to machine code






43. A group or network of honeypots






44. A collection of data or information that has a name






45. A mathematical tool for verifying no unintentional changes have been made






46. Pertaining to law - verified as real






47. A passive network attack involving monitoring of traffic.






48. A device that provides the functions of both a bridge and a router.






49. Intellectual property protection for an confidential and critical process






50. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests