Overall Questions (15 random)

You got 13 of 19 possible points.
Your score was: 68 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KryptoKnight

KErberos

SESAME

LDAP

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

ATM

Frame Relay

SONET

SMDS

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Presentation

Session

Datalink

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Need-to-Know control

Access List Control

Owner set access control

Mandatory access control

Role-based access control

Score 1 of 1

Question:

A WAN is

Response:

a Wide Array Node

a Wide Area Network

one of the Wilson-Adder Need types

a Working Authentication Name

the Westinghouse Address Naming convention

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Compensating

Corrective

Preventative

Recovery

Detective

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

Discretionary access control

Clark-Wilson

role-based access control

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Administrative

Technical

Organizational

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Presentation

Datalink

Network

Transport

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Network

Presentation

Transport

Data Link

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Preventative

Compensating

Detective

Recovery

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Address Integrity

Accessibility

Confidentialty

Availability

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

CHAP

EAP

PAP

LDAP

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Network

Datalink

Presentation

Transport