Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Data Link

Network

Transport

Physical

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the role

the system

the GPO

the owner

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

mandatory access control

Discretionary access control

Clark-Wilson

Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Fuel/Oxygen

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Heat/Combustion/Oxygen

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Risk

incorrect

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Vulnerability

incorrect

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Network

Transport

Application

Data Link

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

B

D

A

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

A

C

B

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

User acceptance

Cost to implement

Initial Registration

Rings/Weight change

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Technical

Administrative

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

PAP

EAP

CHAP

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Presentation

Network

Physical

Transport

Data Link

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Role-based access control

Access List Control

Need-to-Know control

Mandatory access control