Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1
(skipped)

Question:

Which classification of fuel type is gasoline given?

Response:

B

A

C

D

Score 0 of 1
(skipped)

Question:

Which classification of fuel type is grease given?

Response:

D

B

C

A

Score 1 of 1

Question:

A LAN is

Response:

a Least Access Notification

a Local Area Network

a Local Authentication Node

a Local Account Name

a Linear Applebaum Network diagram

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

ring

star

bus

mesh

2 layer star

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Moore's Law

Diffe-Hillman's Axiom

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Owner set access control

Need-to-Know control

Role-based access control

Access List Control

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Owner

Organizational

Techincal

Technical

Physical

Administrative

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Physical

Network

Data Link

Transport

Session

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Network

Session

Transport

Data Link

Physical

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Physical

Technical

Organizational

Visual

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

5

7

10

8

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the owner

network ACL

the role

the system

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Datalink

Transport

Network

Presentation

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Compensating

Corrective

Recovery

Preventative