Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Detective

Preventative

Compensating

Recovery

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

A LAN is

Response:

a Local Account Name

a Local Authentication Node

a Linear Applebaum Network diagram

a Local Area Network

a Least Access Notification

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Presentation

Session

Network

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KryptoKnight

KErberos

SESAME

LDAP

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Manual

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Session

Network

Physical

Data Link

Transport

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Network

Application

Datalink

Transport

Presentation

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

SONET

Frame Relay

SMDS

MPLS

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Technical controls

Physical controls

Administrative controls

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Detective

Recovery

Compensating

Preventative

Corrective

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Mandatory access control

Need-to-Know control

Access List Control

Role-based access control

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Owner

Physical

Technical

Administrative

Organizational

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

role-based access control

Clark-Wilson

Discretionary access control