Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Compensating

incorrect

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Accessibility

Confidentialty

Data Integrity

Authentication

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Administrative controls

Both technical and administrative controls

Technical controls

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Confidentialty

Address Integrity

Accessibility

Availability

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Transport

Session

Datalink

Presentation

Network

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Owner

Physical

Techincal

Technical

Organizational

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Datalink

Network

Transport

Presentation

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Detective

Preventative

Deterrent

Recovery

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

PAP

CHAP

LDAP

Score 1 of 1

Question:

Which access control includes training?

Response:

Technical

Administrative

Physical

Organizational

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Owner

Organizational

Technical

Administrative

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

ATM

SONET

SMDS

Frame Relay

MPLS

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Compensating

Recovery

Preventative

Detective