Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Voice

Retinal imagery

Hand shape/pattern

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Administrative

Organizational

Technical

Owner

Physical

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Transport

Presentation

Datalink

Network

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Network

Application

Datalink

Transport

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Presentation

Physical

Transport

Data Link

Network

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the system

the GPO

network ACL

the owner

Score 0 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

D

B

C

A

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Rijndael's Challenge

Kerckhoff's Principle

Moore's Law

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Technical

Administrative

Organizational

Owner

Physical

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

A LAN is

Response:

a Least Access Notification

a Local Area Network

a Local Authentication Node

a Linear Applebaum Network diagram

a Local Account Name

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KErberos

LDAP

KryptoKnight

SESAME

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct