Overall Questions (15 random)

You got 5 of 19 possible points.
Your score was: 26 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Detective

incorrect

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Preventive

incorrect

Alternate measures of control

Corrective

incorrect
Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Corrective

Compensating

Recovery

Preventative

Detective

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 0 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Recovery

Corrective

Compensating

Detective

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Retinal imagery

Hand shape/pattern

Ear shape/pattern

Voice

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

B

A

C

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

B

A

C

D

Score 0 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

B

D

A

Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Technical controls

Both technical and administrative controls

Physical controls

Administrative controls

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Quantum cryptography

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Physical

Data Link

Session

Transport

Network

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SONET

MPLS

SMDS

ATM

Frame Relay

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

network ACL

the role

the owner

the system

Score 0 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

D

A

B