Overall Questions (15 random)

You got 7 of 19 possible points.
Your score was: 37 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1
(skipped)

Question:

Bell-La Padula focuses primarily on:

Response:

Confidentialty

Data Integrity

Availability

Authentication

Accessibility

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Access Control Lists

Operating System Controls/Policies

Data Access Controls

System Access Controls

Score 0 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Session

Presentation

Datalink

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KryptoKnight

SESAME

KErberos

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Technical controls

Administrative controls

Physical controls

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authorization

Authentication

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Technical

Administrative

Physical

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 0 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Network

Data Link

Transport

Presentation

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electro-mechanical

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

incorrect

$1M dollars per day downtime

Vulnerability

incorrect

A proxy server

incorrect
Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Organizational

Techincal

Technical

Physical

Owner

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

60-80%

20-40%

40-60%

30-50%

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

mandatory access control

Discretionary access control

role-based access control