Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The restoration of computer files from backup media to restore programs and production data to the state that existed at the time of the last safe backup.






2. A planned or unplanned interruption in system availability.






3. Potentially compromising leakage of electrical or acoustical signals.






4. Reduces causes of fire






5. Method for determine functions - identifying function failure - assessing it - and were failure is most likely to occur






6. A collection of data or information that has a name






7. Moving letters around






8. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






9. Robust project management process of new systems with at least the following phases: design and development - production - distribution - operation - maintenance - retirement - and disposal






10. OOP concept of an object at runtime






11. A library of commands maintained by a system for other programs to use - provides consistency and integrity for the programs






12. uropean standard for IT security criteria. Wasn't universally adopted. - Consists of four components:1. "Security Target" 2. "Target of Evaluation" or ToE. 3. Functional Levels. 4. Assurance Levels.






13. A test that answers the questions: Does the organization have the documentation and people it needs. Do they understand the documentation?






14. An index entry in the directory of any storage medium that identifies the space on the medium in which an electronic document resides - thereby preventing that space from being overwritten by other data.






15. The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification.






16. A backup of data located where staff can gain access readily and a localized disaster will not cause harm






17. The problems solving state - the opposite of supervisor mode






18. A cooperative collection of business processes and technologies used for the purpose of binding individuals to a digital certificate






19. May be responsible for overall recovery of an organization or unit(s).






20. Unsolicited commercial email






21. Agreement between two organizations (or two internal business groups) with basically the same equipment/same environment that allows each one to recover at each other's site.






22. Potential danger to information or systems






23. Use of a backup server(s) to protect information and essential processes in the event of a primary system failure.






24. An attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input.






25. Scrambled form of the message or data






26. A Trojan horse with the express underlying purpose of controlling host from a distance






27. Converts a high level language into machine language






28. Heavily populated areas - particularly susceptible to high-intensity earthquakes - floods - tsunamis - or other disasters - for which emergency response may be necessary in the event of a disaster.






29. A layer 2 device that used to connect two or more network segments and regulate traffic.






30. Those actions and backup processes determined by an organization to be necessary to meet its data recovery and restoration objectives - including timeframes - technologies - offsite storage - and will ensuretime objectives can be met.






31. Threats x Vulnerability x Asset Value = Total Risk






32. Must be legally permissible - meaning it was seized legally and the chain of custody was not broken. To be admissible in court - it needs to be relevant - sufficient - and reliable.






33. A computer designed for the purpose of studying adversaries






34. Less granular organization of controls -






35. The process of identifying - accessing - reducing risk to an acceptable level - and implementing the right countermeasure to maintain that level of risk






36. Authentication protocol which only uses symmetric session keys between principals distributed by a 3rd party using different preshared symmetric keys






37. Independent malware that requires user interaction to execute






38. System of law based upon what is good for society






39. Individuals and departments responsible for the storage and safeguarding of computerized data.






40. Subject based description of a system or a collection of resources






41. Renders the record inaccessible to the database management system






42. Determines the impact of the loss of an operational or technological resource. The loss of a system - network or other critical resource may affect a number of business processes.






43. To start business continuity processes






44. Asymmetric encryption of a hash of message






45. To evaluate the current situation and make basic decisions as to what to do






46. The partial or full duplication of data from a source database to one or more destination databases.






47. A state where two subjects can access the same object without proper mediation






48. Archival Data is information that is not directly accessible to the user of a computer system but that the organization maintains for long-term storage and record keeping purposes.






49. A collection of information designed to reduce duplication and increase integrity






50. Insurance coverage for disaster related expenses that may be incurred until operations are fully recovered after a disaster.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests