Overall Questions (15 random)

You got 7 of 15 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Moore's Law

Diffe-Hillman's Axiom

Rijndael's Challenge

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRA or Type IV error

CER or Type III error

FRR or Type I error

FAR or Type II error

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Recovery

Detective

Corrective

Compensating

Preventative

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Compensating

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Owner

Administrative

Technical

Physical

Organizational

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Administrative

Organizational

Score 0 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

8

7

5

10

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

SONET

SMDS

Frame Relay

MPLS

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Technical controls

Physical Controls

Both Technical and Administrative

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Transport

Application

Network

Datalink

Presentation

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Physical

Owner

Organizational

Technical

Administrative

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

MPLS

Frame Relay

SONET

SMDS

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Presentation

Data Link

Network

Physical

Transport