Overall Questions (15 random)

You got 11 of 19 possible points.
Your score was: 58 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

Frame Relay

SMDS

MPLS

SONET

ATM

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Recovery

Compensating

Preventative

Detective

Corrective

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Risk

incorrect

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Technical

Organizational

Physical

Administrative

Techincal

Owner

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Retinal imagery

Hand shape/pattern

Ear shape/pattern

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

LophtCrack

John the Ripper

brute force/dictionary attack

Packet sniffing

MAC the Knife

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Datalink

Network

Presentation

Application

Transport

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

10

7

8

5

Score 0 of 1
(skipped)

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

FAR or Type II error

CER or Type III error

FRA or Type IV error

Score 0 of 1
(skipped)

Question:

Which classification of fuel type is a computer given?

Response:

C

B

A

D

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

ring

bus

2 layer star

mesh

star

Score 0 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Authentication

Data Integrity

Confidentialty

Accessibility

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Risk

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Vulnerability

incorrect
Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Technical controls

Administrative controls

Both Technical and Administrative controls