Overall Questions (15 random)

You got 14 of 19 possible points.
Your score was: 74 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Hand shape/pattern

Retinal imagery

Voice

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

D

C

B

A

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

PAP

LDAP

CHAP

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Presentation

Transport

Datalink

Network

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which access control includes cameras?

Response:

Physical

Administrative

Visual

Organizational

Technical

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Network

Session

Presentation

Transport

Datalink

Score 1 of 1

Question:

A LAN is

Response:

a Local Area Network

a Linear Applebaum Network diagram

a Local Authentication Node

a Least Access Notification

a Local Account Name

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Datalink

Transport

Application

Presentation

Network

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Both Technical and Administrative controls

Physical controls

Administrative controls

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Network

Data Link

Application

Session

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

C

B

A

D

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Technical

Physical

Organizational