Overall Questions (15 random)

You got 7 of 19 possible points.
Your score was: 37 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Data Link

Transport

Session

Application

Score 1 of 1

Question:

Which access control includes training?

Response:

Technical

Administrative

Organizational

Physical

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Compensating

Corrective

Recovery

Detective

Preventative

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

D

A

C

B

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Deterrent

Recovery

Detective

Corrective

Preventative

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Quantum cryptography

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

SESAME

OpenVPN

TACACS

KERBEROS

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Administrative Controls

Both Technical and Administrative

Technical controls

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Data Access Controls

Firewalls/IPS

Operating System Controls/Policies

Access Control Lists

System Access Controls

Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Transport

Network

Physical

Session

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Compensating

Corrective

Recovery

Detective

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Datalink

Transport

Network

Presentation

Session

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Datalink

Presentation

Application

Transport

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

C

A

D