Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Process of identifying the risks to an organization - assessing the critical functions - defining the controls in place to reduce organization exposure and evaluating the cost for such controls.






2. Dedicated fast memory located on the same board as the CPU






3. The core logic engine of an operating system which almost never changes






4. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






5. Initial surge of current






6. Autonomous malware that requires a flaw in a service






7. Narrow scope examination of a system






8. To create a copy of data as a precaution against the loss or damage of the original data.






9. A programming device use in development to circumvent controls






10. A committee of decision makers - business owners - technology experts and continuity professionals - tasked with making strategic recovery and continuity planning decisions for the organization.






11. Physical description on the exterior of an object that communicates the existence of a label






12. Collection of data on business functions which determines the strategy of resiliency






13. A type of attack involving attempted insertion - deletion or altering of data.






14. Requirement of access to data for a clearly defined purpose






15. Something that happened






16. Fault tolerance for power






17. Real-time - automatic and transparent backup of data.






18. A hash that has been further encrypted with a symmetric algorithm






19. A peripheral data storage device that may be found inside a desktop or laptop as permanent storage solution. The hard disk may also be a transportable version and attached to a desktop or laptop.






20. The first rating that requires security labels






21. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






22. Induces a crime - tricks a person - and is illegal






23. Data or interference that can trigger a false positive






24. Written suggestions that direct choice to a few alternatives






25. A. Common Combustibles B. Liquid C. Electrical D Combustible Metals






26. The point in time to which systems and data must be recovered after an outage. (e.g. End of previous day's processing). Rpos are often used as the basis for the development of backup strategies.






27. Quantity of risk remaining after a control is applied






28. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






29. Mitigate damage by isolating compromised systems from the network.






30. To evaluate the current situation and make basic decisions as to what to do






31. For PKI - to store another copy of a key






32. A collection of information designed to reduce duplication and increase integrity






33. To reduce sudden rises in current






34. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






35. Any event - whether anticipated (i.e. - public service strike) or unanticipated (i.e. - blackout) which disrupts the normal course of business operations at an organization location.






36. Companies should have their own team - made up of ppl from management - IT leagal - HR - and public relations - security and other key areas






37. A basic level of network access control that is based upon information contained in the IP packet header.






38. To execute more than one instruction at an instant in time






39. A Denial of Service attack that exploits packet filter firewalls that only inspect the initial fragment of a fragmented packet.






40. Reprogrammable basic startup instructions






41. The component of Disaster Recovery which deals specifically with the relocation of a key function or department in the event of a disaster - including personnel - essential records - communication facilities - fax - mail services - etc.






42. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






43. A BCP testing type - a test that answers the question: Can the organization replicate the business process?






44. Recovery alternative - short-term - high cost movable processing location






45. Line noise that is superimposed on the supply circuit.






46. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






47. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






48. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






49. Portable media used to store data that is not presently in use by an organization to free up space but still allow for disaster recovery. May also be called "Backup Tapes."






50. An encryption method that has a key as long as the message







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests