Overall Questions (15 random)

You got 13 of 19 possible points.
Your score was: 68 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

Frame Relay

ATM

SMDS

SONET

MPLS

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Network

Data Link

Transport

Session

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Rijndael's Challenge

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Compensating

Recovery

Detective

Preventative

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Physical

Transport

Data Link

Network

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

John the Ripper

MAC the Knife

Packet sniffing

brute force/dictionary attack

LophtCrack

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Technical

Organizational

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Presentation

Data Link

Transport

Network

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Vulnerability

incorrect

The probability of a threat being realized

Threat

incorrect

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Retinal imagery

Ear shape/pattern

Voice

Hand shape/pattern

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Datalink

Network

Presentation

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

EAP

LDAP

CHAP