Overall Questions (15 random)

You got 8 of 15 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Iris Scanning

Hand scanning

Finger scanning

Badge Scanning

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Soda Acid

CO2

Water

ESD Blanket

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Authentication

Administrative

Technical

Organizational

Physical

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Organizational

Visual

Technical

Physical

Administrative

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

John the Ripper

LophtCrack

brute force/dictionary attack

MAC the Knife

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the owner

the system

the role

the GPO

network ACL

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Mandatory access control

Access List Control

Discretionary access control

Manager set control

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Network

Transport

Session

Physical

Data Link

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Both Technical and Administrative controls

Technical controls

Physical controls

Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Recovery

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Compensating

incorrect

Providing alternate ways of accomplishing a task

Preventative

incorrect

Restoring systems and information

Recovery

correct
Score 0 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Network

Presentation

Session

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat

incorrect

The danger of having a vulnerability exploited

Threat agent

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Recovery

Detective

Preventative

Deterrent

Corrective

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Transport

Presentation

Network

Data Link

Physical