Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Administrative controls

Physical controls

Both technical and administrative controls

Technical controls

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Presentation

Physical

Data Link

Network

Transport

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

Discretionary access control

role-based access control

mandatory access control

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

MPLS

SONET

Frame Relay

ATM

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Compensating

Preventative

Corrective

Recovery

Detective

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Data Integrity

Authentication

Availability

Accessibility

Confidentialty

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

MPLS

SONET

SMDS

ATM

Frame Relay

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Technical controls

Physical Controls

Both Technical and Administrative

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Technical

Owner

Organizational

Administrative

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Physical

Transport

Network

Session

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Retinal imagery

Voice

Hand shape/pattern

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

John the Ripper

MAC the Knife

Packet sniffing

LophtCrack

brute force/dictionary attack

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Mandatory access control

Manager set control

Access List Control

Role-based access control