Overall Questions (15 random)

You got 8 of 15 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

40-60%

60-80%

30-50%

20-40%

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Ear shape/pattern

Retinal imagery

Voice

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Physical

Authentication

Technical

Organizational

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Datalink

Network

Presentation

Application

Transport

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Recovery

Deterrent

Corrective

Preventative

Score 0 of 1
(skipped)

Question:

Which classification of fuel type is a computer given?

Response:

C

B

A

D

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Recovery

Detective

Compensating

Preventative

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

SMDS

Frame Relay

MPLS

SONET

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Presentation

Session

Transport

Network

Datalink

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Organizational

Technical

Score 0 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Administrative controls

Physical controls

Technical controls

Score 1 of 1

Question:

Which access control includes training?

Response:

Administrative

Physical

Organizational

Technical