Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Owner

Administrative

Physical

Organizational

Score 1 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

B

A

C

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Presentation

Session

Network

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authorization

Authentication

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

Water

Soda Acid

CO2

Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Access List Control

Mandatory access control

Discretionary access control

Manager set control

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Owner

Physical

Technical

Organizational

Administrative

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Network

Presentation

Datalink

Application

Transport

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Network

Session

Transport

Physical

Score 1 of 1

Question:

A WAN is

Response:

a Wide Area Network

a Working Authentication Name

a Wide Array Node

the Westinghouse Address Naming convention

one of the Wilson-Adder Need types

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Corrective

Detective

Recovery

Compensating

Preventative

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Network

Session

Transport

Physical

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Hand shape/pattern

Retinal imagery

Voice

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

network ACL

the role

the system

the owner

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat

incorrect

The danger of having a vulnerability exploited

Threat agent

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct