Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Location to perform the business function






2. A description of a database






3. A test conducted on a specific component of a plan - in isolation from other components - typically under simulated operating conditions.






4. Unauthorized wireless network access device.






5. A subnetwork with storage devices servicing all servers on the attached network.






6. Descrambling the encrypted message with the corresponding key






7. Physical description on the exterior of an object that communicates the existence of a label






8. Control category- to discourage an adversary from attempting to access






9. Malware that makes small random changes to many data points






10. To be admissible in court they have to be made and collected in the normal course of business - not specially generated for a case in court. They can easily be considered hearsay if no firsthand proof of their accuracy and reliability exists






11. Vehicle or tool that exploits a weakness






12. Planning for the delegation of authority required when decisions must be made without the normal chain of command






13. A test conducted on multiple components of a plan - in conjunction with each other - typically under simulated operating conditions






14. The past U.S. military accepted set of standards and processes for network evaluation and assurance - which combines function and assurance requirements






15. Review of data






16. Mediates communication between un-trusted hosts on behalf of the hosts that it protects.






17. Policy or stated actions






18. A planned or unplanned interruption in system availability.






19. Converts source code to an executable






20. Searching for wireless networks in a moving car.






21. Includes identification and collection of the evidence - its storage - preservation - transportation - presentation in court - and return to the owner






22. Eavesdropping on network communications by a third party.






23. Hiding the fact that communication has occurred






24. An alert or alarm that is triggered when no actual attack has taken place






25. Demonstrate the actual ability to recover and can verify the compatibility of backup facilities






26. The study of cryptography and cryptanalysis






27. Information about a particular data set






28. Minimal Protection - and is used for systems that were evaluated but failed to meet the criteria for higher divisions






29. A BCP testing type - (structured walkthrough) - a test that answers the question: Is everything need for recovery available?






30. Someone who wants to cause harm






31. Of a system without prior knowledge by the tester or the tested






32. Most granular organization of controls






33. Mediation of covert channels must be addressed






34. The chance that something negative will occur






35. An opportunity for a threat to cause loss. (terminology that encompasses many recent risk terms)






36. Encryption system using a pair of mathematically related unequal keys






37. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






38. Recording activities at the keyboard level






39. Calculation encompassing threats - vulnerabilities and assets






40. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






41. May render the data inaccessible to the application intended to be used in processing the file - but may not actually remove the data






42. Maintenance procedures outline the process for the review and update of business continuity plans.






43. An asymmetric cryptography mechanism that provides authentication.






44. Periodic - automatic and transparent backup of data in bulk.






45. Notification that a potential disaster situation exists or has occurred; direction for recipient to stand by for possible activation of disaster recovery plan.






46. Intellectual property protection for an invention






47. A test conducted on one or more components of a plan under actual operating conditions.






48. A choice in risk management - to implement a control that limits or lessens negative effects






49. Impossibility of denying authenticity and identity






50. The least formatted and therefore most portable form of text for computerized documents. ASCII files are often called plaintext files.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests