Overall Questions (15 random)

You got 6 of 19 possible points.
Your score was: 32 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Access Control Lists

Operating System Controls/Policies

Data Access Controls

System Access Controls

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Preventative

Detective

Recovery

Compensating

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

TACACS

OpenVPN

SESAME

Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Administrative controls

Physical controls

Both technical and administrative controls

Technical controls

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Techincal

Physical

Technical

Administrative

Organizational

Owner

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Recovery

Corrective

Detective

Deterrent

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

A

D

C

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Transport

Network

Presentation

Data Link

Physical

Score 0 of 1

Question:

Which access control includes cameras?

Response:

Organizational

Visual

Administrative

Technical

Physical

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the owner

the GPO

the system

the role

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Authentication

Organizational

Administrative

Physical

Technical

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Organizational

Physical

Administrative

Owner

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Quantum cryptography

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electronic

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect