Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the owner

the role

the GPO

the system

Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Application

Transport

Data Link

Session

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Organizational

Owner

Technical

Physical

Administrative

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Working Authentication Name

a Wide Array Node

one of the Wilson-Adder Need types

a Wide Area Network

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

Cost to implement

User acceptance

Initial Registration

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Transport

Data Link

Session

Physical

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

B

C

D

A

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Datalink

Presentation

Transport

Session

Network

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Access List Control

Discretionary access control

Manager set control

Role-based access control

Mandatory access control

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Technical controls

Both Technical and Administrative controls

Physical controls

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Confidentialty

Availability

Accessibility

Data Integrity

Authentication

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 0 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

10

7

5

8

6

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct