Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Use of specialized techniques for recovery - authentication - and analysis of electronic data






2. To execute more than one instruction at an instant in time






3. Mathematical function that determines the cryptographic operations






4. To evaluate the current situation and make basic decisions as to what to do






5. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






6. A legal enforceable agreement between: two people - two organizations - a person and an organization.






7. A collection of data or information that has a name






8. Records or documents that - if damaged or destroyed - would cause considerable inconvenience and/or require replacement or recreation at considerable expense.






9. Information about data or records






10. Redundant component that provides failover capability in the event of failure or interruption of a primary component.






11. Information about a particular data set






12. Object based description of a single resource and the permission each subject






13. A plan of action to commence immediately to prevent the loss of life and minimize injury and property damage.






14. Vehicle or tool that exploits a weakness






15. Potentially retrievable data residue that remains following intended erasure of data.






16. Independent malware that requires user interaction to execute






17. Potentially compromising leakage of electrical or acoustical signals.






18. A group or network of honeypots






19. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






20. A description of a database






21. A documented battle plan for coordinating response to incidents.






22. Specific format of technical and physical controls that support the chosen framework and the architecture






23. Inference about encrypted communications






24. Pertaining to law - no omissions






25. Momentary loss of power






26. Protection of stored or displayed information by removal/reduction of the magnetic field (demagnetization).






27. The managerial approval to operate a system based upon knowledge of risk to operate






28. OOP concept of an object at runtime






29. Most granular organization of controls






30. Data or interference that can trigger a false positive






31. Reduces causes of fire






32. The process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks






33. Control type- that is communication based - typically written or oral






34. The level and label given to an individual for the purpose of compartmentalization






35. Unchecked data which spills into another location in memory






36. Unauthorized access of information (e.g. Tapping - sniffing - unsecured wireless communication - emanations)






37. The one person responsible for data - its classification and control setting






38. A critical event - which - if not handled in an appropriate manner - may dramatically impact an organization's profitability - reputation - or ability to operate.






39. Copies of the plan are handed out to each functional area to ensure the plan properly deals with the area's needs and vulnerabilities






40. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






41. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






42. OOP concept of a taking attributes from the original or parent






43. Using small special tools all tumblers of the lock are aligned - opening the door






44. Hitting a filed down key in a lock with a hammer to open without real key






45. A one way - directed graph which indicates confidentiality or integrity flow






46. A back up type - where the organization has excess capacity in another location.






47. Unauthorized intrusion - unauthorized alteration or destruction - and using malicious code






48. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






49. The collection and summation of risk data relating to a particular asset and controls for that asset






50. The asynchronous duplication of the production database on separate media to ensure data availability - currency and accuracy. File shadowing can be used as a disaster recovery solution if performed remotely.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests