Overall Questions (15 random)

You got 12 of 19 possible points.
Your score was: 63 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Administrative controls

Both Technical and Administrative controls

Physical controls

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

C

B

A

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

User acceptance

Rings/Weight change

Initial Registration

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Owner

Administrative

Physical

Organizational

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Exposure

incorrect

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Threat

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Network

Physical

Data Link

Session

Transport

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

8

6

5

7

10

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Deterrent

Preventative

Recovery

Corrective

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

Frame Relay

ATM

MPLS

SONET

SMDS

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Physical

Administrative

Technical

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Physical

Network

Transport

Session

Data Link

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

CO2

ESD Blanket

Soda Acid