Overall Questions (15 random)

You got 8 of 19 possible points.
Your score was: 42 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1
(skipped)

Question:

Which of the following is the highest in the OSI model:

Response:

Presentation

Physical

Data Link

Network

Transport

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

KERBEROS

OpenVPN

SESAME

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Both Technical and Administrative controls

Technical controls

Physical controls

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRA or Type IV error

CER or Type III error

FAR or Type II error

FRR or Type I error

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Technical

Organizational

Physical

Owner

Administrative

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the GPO

the owner

network ACL

the system

Score 1 of 1

Question:

Which classification of fuel type is grease given?

Response:

C

B

D

A

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Need-to-Know control

Owner set access control

Access List Control

Role-based access control

Mandatory access control

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

A

C

B

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Fuel/Oxygen

Heat/Combustion/Oxygen

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Data Link

Transport

Network

Physical