Overall Questions (15 random)

You got 6 of 15 possible points.
Your score was: 40 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Network

Presentation

Datalink

Application

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Physical

Session

Data Link

Network

Score 0 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Clark-Wilson

mandatory access control

Discretionary access control

Score 1 of 1

Question:

Which access control includes training?

Response:

Administrative

Physical

Organizational

Technical

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Transport

Datalink

Application

Presentation

Network

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the owner

the role

the GPO

the system

network ACL

Score 0 of 1

Question:

Which access control includes motion detectors?

Response:

Technical

Organizational

Physical

Administrative

Authentication

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Recovery

Corrective

Compensating

Preventative

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

ring

star

mesh

bus

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Confidentialty

Accessibility

Authentication

Data Integrity

Availability

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Network

Session

Presentation

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

MAC the Knife

John the Ripper

LophtCrack

Packet sniffing

Score 0 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

5

6

8

7

10