• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Menu
  • About
  • Must Read
      • IIS Performance Boost
      • RFID Security
      • Web App Security Testing
      • How to Secure Home Network
      • Prevent Cross-Site Scripting Attacks
      • Renew Self-Signed Certificates
      • Penetration Testing Tools
      • VPN Concentrator
      • Forensic Investigation Tools
      • Digital Certificates
      • Cloud Security Issues
      • Advanced Evasion Prevention
      • Firewall Types
      • Tips to Prevent Data Exfiltration
      • Classified Info Handling
      • MySQL Security
      • Definition of 7 Types of Malware
      • VOIP Security
      • Why Antivirus Software Fails
      • 15 Network Security Vulnerabilities
      • Web App Security
      • IT Security Standards
      • Types of Virtualization
      • Android Security
      • Digital Signature
      • Advanced Malware Protection
    • Close
  • Consultancy
  • Contact

If you are planning to prepare for CISSP exam, but not sure how the hard the exam is and you want to try out a sample test, you can take our CISSP  practice test.

CISSP Sample Test

Start
Congratulations - you have completed CISSP Sample Test. You scored %%SCORE%% out of %%TOTAL%%. Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Question 1
Which of the following is the number one priority of a disaster recovery planning?
A
Preservation of IT assets
B
resumption of business functionalities
C
Personnel evacuation and safety
D
minimize reputation damage
Question 2
An access control system that grants access to information based on that information's classification and the clearance of the individual is known as:
A
Mandatory access control
B
Identity-based access control
C
Clearance-based access control
D
Role-based access control
Question 3
What do we call a database that contains the data structures used by an application:
A
data schema
B
data controller
C
meta data
D
data dictionary
Question 4
The process used to break the key and the plain text from an enciphered text is called  
A
decryption
B
data ciphering
C
cryptanalysis
D
data extraction
Question 5
Access control and card keys are examples of which control systems?
A
preventive controls
B
detection controls
C
correction controls
D
access controls
Question 6
What is the main purpose of separation of authority in an organization?
A
to ensure that only one person can perform a specific task.
B
to limit the capabilities of each individual
C
to ensure access control systems are effective
D
to improve change management systems
Question 7
Why UDP is known as unreliable protocol?
A
UDP has less priority than TCP.
B
UDP does not use communication channel coding .
C
UDP packets are prone to errors.
D
UDP does not guarantee delivery of packets.
Question 8
Which one is not a goal of business impact assessment?
A
to identify critical business functions
B
to determine the maximum acceptable downtime
C
to identify critical IT resources
D
to determine the effectiveness of access control systems
Question 9

What is the purpose of service level agreement(SLA)?

A
to guarantee a maximum level of quality of service required for an application.
B
to guarantee a minimum level of quality of service required for an application.
C
to troubleshoot the issues and faults as soon as they occurs.
D
to ensure a high level of customer satisfaction.
Question 10
The method of cryptography in which both the sender and the recipient use the same key is known as
A
public key cryptography
B
private key cryptography
C
message hashing
D
secret key cryptography
Question 11
What does forensics mean?
A
the process of discovering compromised file.
B
tracking down the prepertator who access the data illegally.
C
preserving evidence of breached system files and data
D
the activity of discovering, preserving, and recording evidence.
Question 12
Security cameras and audit trails are examples of:
A
detective controls.
B
preventive controls.
C
correction conrols.
D
access controls.
Question 13
where can you find Firmware?
A
RAM
B
Hard disk
C
ROM or EPROM
D
USB device
Question 14

Why TCP is a poor choice for streaming video?

A
it does not allow bursty data flow.
B
TCP adds unnecessary overhead such as acknowledgement and sequencing.
C
it has poor error control mechanism.
D
it does not support real time protocol
Question 15
Why does the distribtution of a user's public key not compromise the secrecy of the PKI ?
A
because public key is encrypted.
B
because it only uses the hash value of the actual public key.
C
because a private key is required in conjunction with the public key to decipher the messages.
D
because public key is encrypted with a secret key.
Question 16
Who is responsible for classifying information?
A
information asset custodian.
B
risk manager.
C
information owner.
D
IT auditor
Question 17
What is the main differene between a warm site and a hot site?
A
warm is always powered down and not connected to the main site.
B
warm site is much closer the head office of an organization than a hot site.
C
there is no major difference between a warm site and a hot site.
D
the warm site's IT systems don't have the organization's software or data installed.
Question 18
What is data mining?
A
storing and securing data in a hot site
B
searches for correlations, patterns, and trends in a data warehouse.
C
archiving unnessary data for future use.
D
synchromizing data among all the relational databases in an organization.
Question 19
The process of mapping the available  physical memory into a larger memory is known as
A
memory swapping.
B
spooling.
C
memory extention.
D
virtual memory.
Question 20
Who is responsible for information protection?
A
data custodian.
B
data owner.
C
security manager.
D
system engineer.
Once you are finished, click the button below. Any items you have not completed will be marked incorrect. Get Results
There are 20 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!

Primary Sidebar

CISSP Sample Test

Take a CISSP Sample Test

CISA IT governance Sample test



Twitter Follow @securitywing

Categories

  • AWS
  • containers
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Network Security Tips
  • Off Track
  • Telecom
  • Tutorial

Pages

  • About
  • Best IT Security Certification Exam
  • CISA IT governance Sample test
  • CISA Sample Test
  • CISSP Sample Test Online
  • Consultancy
  • Contact

Popular Posts

  • 8 Effective Ways to Impro...
  • 3 Steps to Install Miniku...
  • Yahoo Mail Security Setti...
  • How to Setup AWS CloudFro...
  • 3 Simple Steps to Capture...
  • 5 Steps to Setup a Nexus3...
  • How to Configure AAA (TAC...
  • How to Install AWS CLI an...
  • How to Configure SNMP in...
  • How to Renew Self-Signed...

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

antivirus audit AWS backup browser check cisco cloud computer cyber data database encryption firewall home hsrp ids informaiton internet intrusion it kubernetes linux load balancing malware network protection putty risk router security security tips server ssh SSL switch tools virus vpn vulnerability web webserver website windows wordpress

Copyright © 2010-2023 ·All Rights Reserved · SecurityWing.com