Overall Questions (15 random)

You got 15 of 19 possible points.
Your score was: 79 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 3 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Datalink

Transport

Network

Presentation

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Operating System Controls/Policies

Data Access Controls

Access Control Lists

System Access Controls

Firewalls/IPS

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

B

A

C

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the owner

network ACL

the system

the role

the GPO

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

User acceptance

Rings/Weight change

Cost to implement

Initial Registration

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Iris Scanning

Badge Scanning

Hand scanning

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

star

bus

mesh

ring

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Preventative

Recovery

Compensating

Detective

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Transport

Application

Session

Data Link

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Physical

Organizational

Technical

Authentication

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

Frame Relay

SMDS

SONET

ATM

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Heat/Fuel/Oxygen