Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Organizational

Administrative

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Deterrent

Preventative

Recovery

Detective

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

MAC the Knife

LophtCrack

Packet sniffing

John the Ripper

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Access List Control

Owner set access control

Role-based access control

Need-to-Know control

Mandatory access control

Score 1 of 1

Question:

A WAN is

Response:

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

a Working Authentication Name

a Wide Array Node

a Wide Area Network

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Exposure

incorrect

A virus that relies on unpatched code or OS levels

Vulnerability

incorrect

The likelihood a threat will be realized, the frequency of natural disasters

Threat

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Session

Network

Transport

Physical

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Owner

Administrative

Technical

Organizational

Physical

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 3 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Threat

incorrect

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 0 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Transport

Data Link

Physical

Presentation

Network

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

SESAME

TACACS

OpenVPN

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Presentation

Datalink

Transport

Application