Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk.






2. Natural or human-readable form of message






3. A process state - to be executing a process on the CPU






4. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






5. Intellectual property protection for an confidential and critical process






6. A design methodology which executes in a linear one way fashion






7. Scrambled form of the message or data






8. The core of a computer that calculates






9. The level and label given to an individual for the purpose of compartmentalization






10. Communication of a security incident to stakeholders and data owners.






11. Review of data






12. After being seized - the investigator should make a bit mirror image copy of the storage media before doing anything else.






13. Summary of a communication for the purpose of integrity






14. Maximum tolerance for loss of certain business function - basis of strategy






15. Independent malware that requires user interaction to execute






16. A risk assessment method - measurable real money cost






17. Small data warehouse






18. Program instructions based upon the CPU's specific architecture






19. Record history of incident






20. A sudden - unexpected event requiring immediate action due to potential threat to health and safety - the environment - or property.






21. Encryption system using a pair of mathematically related unequal keys






22. Eavesdropping on network communications by a third party.






23. The core logic engine of an operating system which almost never changes






24. Code breaking - practice of defeating the protective properties of cryptography.






25. The partial or full duplication of data from a source database to one or more destination databases.






26. A specialized wireless receiver/ transmitter placed in orbit that facilitates long distance communication.






27. Dictate that data collected by govt. agencies must be collected fairly and lawfully - must be used only for the purpose for which they were collected - must only be held for a reasonable amount of time - and must be accurate and timely.






28. A choice in risk management - to convince another to assume risk - typically by payment






29. The time period between a disaster and a return to normal functions - during which the disaster recovery plan is employed.






30. Power surge






31. The process of planning for and/or implementing the restarting of defined business operations following a disaster - usually beginning with the most critical or time-sensitive functions






32. A collection of information designed to reduce duplication and increase integrity






33. Siphoning out or leaking information by dumping computer files or stealing computer reports and tapes.






34. May be responsible for overall recovery of an organization or unit(s).






35. To stop damage from spreading






36. Use of specialized techniques for recovery - authentication - and analysis of electronic data






37. Interim procedures that may be used by a business unit to enable it to continue to perform its critical functions during temporary unavailability of information and/or resources






38. To smooth out reductions or increases in power






39. Specific format of technical and physical controls that support the chosen framework and the architecture






40. To segregate for the purposes of labeling






41. Impossibility of denying authenticity and identity






42. To collect many small pieces of data






43. A protocol for the efficient transmission of voice over the Internet






44. Cooperative hardware and operating system notification process for prioritizing execution due to the change in state of components






45. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






46. The problems solving state - the opposite of supervisor mode






47. Actions measured against either a policy or what a reasonable person would do






48. Executive responsibilities of goal setting - delegation - and verification - based upon the mission.






49. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






50. A codename that refers to the study and mitigation of information disclosure via electromagnetic emanations from electronic equipment.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests