Overall Questions (15 random)

You got 12 of 19 possible points.
Your score was: 63 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Network

Session

Presentation

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Administrative

Physical

Authentication

Technical

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Physical

Session

Transport

Network

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Owner set access control

Mandatory access control

Access List Control

Need-to-Know control

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Manager set control

Mandatory access control

Access List Control

Discretionary access control

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Preventative

Corrective

Detective

Compensating

Recovery

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

ring

star

2 layer star

mesh

bus

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Technical

Administrative

Physical

Organizational

Owner

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Technical

Administrative

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

B

C

A

D

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

CHAP

PAP

EAP

LDAP

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electro-mechanical

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

Frame Relay

MPLS

SONET

SMDS

ATM

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

B

A

D

C