Overall Questions (15 random)

You got 8 of 19 possible points.
Your score was: 42 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Organizational

Visual

Technical

Physical

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

a Wide Array Node

the Westinghouse Address Naming convention

one of the Wilson-Adder Need types

a Wide Area Network

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Initial Registration

User acceptance

Rings/Weight change

Score 0 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Corrective

Compensating

Preventative

Detective

Recovery

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Owner

Organizational

Technical

Physical

Administrative

Score 1 of 1

Question:

A LAN is

Response:

a Local Authentication Node

a Least Access Notification

a Linear Applebaum Network diagram

a Local Area Network

a Local Account Name

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Iris Scanning

Badge Scanning

Hand scanning

Finger scanning

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

B

A

D

C

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Transport

Network

Session

Physical

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SMDS

MPLS

Frame Relay

ATM

SONET

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Compensating

Detective

Recovery

Corrective

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

John the Ripper

brute force/dictionary attack

MAC the Knife

LophtCrack

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct