Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The managerial approval to operate a system based upon knowledge of risk to operate






2. One method of exercising teams in which participants perform some or all of the actions they would take in the event of plan activation. Operational exercises are typically performed under actual operating conditions






3. An attack that breaks up malicious code into fragments - in an attempt to elude detection.






4. A group or network of honeypots






5. An unintended communication path






6. A state for operating system tasks only






7. Creation distribution update and deletion






8. To start business continuity processes






9. System directed mediation of access with labels






10. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






11. Responsibility for actions






12. Potential danger to information or systems






13. Planning for the delegation of authority required when decisions must be made without the normal chain of command






14. To reduce sudden rises in current






15. The chance that something negative will occur






16. Is secondhand and usually not admissible in court






17. Recovery alternative - everything needed for the business function - except people and last backup






18. The guardian of asset(s) - a maintenance activity






19. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






20. A template for the designing the architecture






21. Pertaining to law - lending it self to one side of an argument






22. Moving letters around






23. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






24. To jump to a conclusion






25. Interception of a communication session by an attacker.






26. The back up of system - application - program and/or production files to secondary media. Data backups can be used to restore corrupted or lost data or to recover entire systems and databases in the event of a disaster.






27. For PKI - decertify an entities certificate






28. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






29. To ensure that evidence will be admissible in court by showing it was properly controlled and handled before being presented in court






30. Event(s) that cause harm






31. Recovery alternative - short-term - high cost movable processing location






32. An administrative unit or a group of objects and subjects controlled by one reference monitor






33. With enough computing power trying all possible combinations






34. A set of laws that the organization agrees to be bound by






35. An alert or alarm that is triggered when no actual attack has taken place






36. Dedicated fast memory located on the same board as the CPU






37. The first rating that requires security labels






38. A device that sequentially switches multiple analog inputs to the output.






39. Independent malware that requires user interaction to execute






40. Forgery of the sender's email address in an email header.






41. A back up type - where the organization has excess capacity in another location.






42. Process of statistically testing a data set for the likelihood of relevant information.






43. Security Policy - Personnel Controls - Supervisory Structure - Security Awareness Training - Testing






44. A legal enforceable agreement between: two people - two organizations - a person and an organization.






45. The current internationally accepted set of standards and processes for information security products evaluation and assurance - which joins function and assurance requirements






46. Highest level of authority at EOC with knowledge of the business process and the resources available






47. A backup type which creates a complete copy






48. Most granular organization of controls






49. When two or more computers are networked together in a LAN situation - one computer may be utilized as a storage location for files for the group.






50. Evaluation of a system without prior knowledge by the tester







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests