Overall Questions (15 random)

You got 6 of 15 possible points.
Your score was: 40 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

User acceptance

Initial Registration

Rings/Weight change

Cost to implement

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

SONET

MPLS

Frame Relay

SMDS

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Owner

Administrative

Physical

Organizational

Technical

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Preventative

Deterrent

Recovery

Corrective

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Organizational

Physical

Technical

Administrative

Owner

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Technical

Organizational

Techincal

Administrative

Physical

Owner

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

star

bus

ring

2 layer star

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat

incorrect

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat agent

incorrect
Score 0 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

A

D

B

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Accessibility

Address Integrity

Availability

Confidentialty

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

PAP

EAP

CHAP

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

Water

ESD Blanket

Soda Acid

Score 0 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

D

C

B