Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

CO2

Soda Acid

ESD Blanket

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Both Technical and Administrative controls

Technical controls

Administrative controls

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Compensating

Corrective

Recovery

Detective

Preventative

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Rijndael's Challenge

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Iris Scanning

Hand scanning

Badge Scanning

Finger scanning

Score 1 of 1

Question:

Which access control includes training?

Response:

Technical

Administrative

Organizational

Physical

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

Frame Relay

ATM

MPLS

SONET

SMDS

Score 0 of 5
(skipped)

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Preventative

Compensating

Recovery

Corrective

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Organizational

Technical

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Physical

Techincal

Organizational

Owner

Administrative

Technical

Score 0 of 1
(skipped)

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

incorrect

A virus that relies on unpatched code or OS levels

incorrect

The likelihood a threat will be realized, the frequency of natural disasters

incorrect

$1M dollars per day downtime

incorrect

A proxy server

incorrect
Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

ATM

SONET

SMDS

Frame Relay

MPLS

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Access Control Lists

Data Access Controls

Operating System Controls/Policies

System Access Controls