Test your basic knowledge |

CISSP Certified Information Systems Security Professional

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One of the most important first steps in the planning development. Qualitative and quantitative data needs to be gathered - analyzed - interpreted and presented to management






2. A process state - (blocked) needing input before continuing






3. Unchecked data which spills into another location in memory






4. Bundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult.






5. A form of data hiding which protects running threads of execution from using each other's memory






6. System of law based upon precedence - with major divisions of criminal - tort - and administrative






7. A plan used by an organization or business unit to respond to a specific systems failure or disruption of operations. A contingency plan may use any number of resources (e.e workaround procedures - alternate work area - etc.)






8. Segmented memory addressing - encapsulation of objects - time multiplexing of shared resources - naming distinctions - and virtual mapping.






9. Descrambling the encrypted message with the corresponding key






10. Business and technical process of applying security software updates in a regulated periodic way






11. Statistical probabilities of a collision are more likely than one thinks






12. OOP concept of an object's abilities - what it does






13. Loss would inconvenience the organization but disclosure is unlikely to result in financial loss or serious damage to credibility.






14. Mitigate damage by isolating compromised systems from the network.






15. Low level - pertaining to planning






16. The managerial approval to operate a system based upon knowledge of risk to operate






17. A backup supply that provides continuous power to critical equipment in the event that commercial power is lost.






18. Converts source code to an executable






19. Object based description of a single resource and the permission each subject






20. The duplication of data on separate disks in real time to ensure its continuous availability - currency and accuracy. True mirroring will enable a zero recovery point objective.






21. Framework that defines goals for the controls that should be used to properly manage IT - consists of 4 domains: - Plan and Organize - - Acquire and Implement - Deliver and Support - Monitor and Evaluate






22. A record that must be preserved and available for retrieval if needed.






23. It is embedded as part of a complete device often including hardware and mechanical parts - Features a limited OS - Mobile phones - routers and wireless devices take a similar approach - Less than robust security features - Difficult to patch.






24. To evaluate the current situation and make basic decisions as to what to do






25. Searching for wireless networks in a moving car.






26. Representatives from each functional area or department get together and walk through the plan from beginning to end.






27. Firewalls - encryption - and access control lists






28. The level and label given to an individual for the purpose of compartmentalization






29. Control type- that is communication based - typically written or oral






30. The past U.S. military accepted set of standards and processes for computer systems evaluation and assurance - which combines function and assurance requirements






31. Memory management programming which make the limited RAM of the physical machine appear to be more by using a portion of the hard drive






32. Using small special tools all tumblers of the lock are aligned - opening the door






33. Natural occurrence in circuits that are in close proximity






34. Uses two or more legal systems






35. Third party processes used to organize the implementation of an architecture






36. Hiding the fact that communication has occurred






37. Wrongs committed against individuals or companies that result in injury or damages. Civil law does not use prison time - usually a fine is paid






38. Indivisible - data field must contain only one value that either all transactions take place or none do






39. A document designed to periodically exercise specific action tasks and procedures to ensure viability in a real disaster or severe outage situation.






40. A process state - to be executing a process on the CPU






41. Disruption of operation of an electronic device due to a competing electromagnetic field.






42. Intellectual property protection for an invention






43. Of a system without prior knowledge by the tester or the tested






44. Those who initiate the attack






45. An internal list of contact information used for the communication of incident information - designed in a distributed manor so that no one person is responsible for contacting everyone.






46. A BCP testing type - a test that answers the question: Can the organization operate at the alternate location only?






47. Process of planning for and/or implementing procedures for the repair or relocation of the primary site and its contents - and for the restoration of normal operations at the primary site.






48. A planned or unplanned interruption in system availability.






49. An event which stops business from continuing.






50. Another subject cannot see an ongoing or pending update until it is complete







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests