Overall Questions (15 random)

You got 13 of 19 possible points.
Your score was: 68 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

D

B

C

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Network

Session

Transport

Presentation

Datalink

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Technical controls

Both technical and administrative controls

Physical controls

Administrative controls

Score 1 of 1

Question:

A LAN is

Response:

a Least Access Notification

a Local Area Network

a Linear Applebaum Network diagram

a Local Account Name

a Local Authentication Node

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the system

the role

the owner

network ACL

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Corrective

Preventative

Compensating

Recovery

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Quantum cryptography

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electro-mechanical

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

Initial Registration

User acceptance

Cost to implement

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Organizational

Technical

Physical

Administrative

Owner

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Presentation

Application

Transport

Datalink

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Technical

Organizational

Administrative

Owner