Terms and Definitions

You got 3 of 10 possible points.
Your score was: 30 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

incorrect

The probability of a threat being realized

incorrect

Presence of a vulnerability which exposes the organization

incorrect
Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

incorrect

Correcting violations and incidents

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Preventative

incorrect

Providing alternate ways of accomplishing a task

incorrect

Restoring systems and information

incorrect
Score 1 of 1

Question:

A LAN is

Response:

a Local Authentication Node

a Least Access Notification

a Local Account Name

a Local Area Network

a Linear Applebaum Network diagram

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 5

Question:

What is a cryptographic keystream that can only be used once?

Response:

Correct AnswerUser Answer
/one.*time.*pad/iAES
Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Working Authentication Name

one of the Wilson-Adder Need types

a Wide Area Network

a Wide Array Node