Overall Questions (15 random)

You got 6 of 19 possible points.
Your score was: 32 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Working Authentication Name

a Wide Array Node

one of the Wilson-Adder Need types

a Wide Area Network

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FAR or Type II error

FRA or Type IV error

CER or Type III error

FRR or Type I error

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Owner

Organizational

Technical

Administrative

Physical

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

ring

star

mesh

bus

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Manual

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Diffe-Hillman's Axiom

Rijndael's Challenge

Moore's Law

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Organizational

Owner

Physical

Administrative

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Session

Network

Transport

Application

Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Session

Data Link

Network

Physical

Transport

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Organizational

Physical

Technical

Authentication

Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Discretionary access control

Manager set control

Access List Control

Mandatory access control

Score 0 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Recovery

Detective

Compensating

Corrective

Preventative

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

MPLS

SONET

ATM

SMDS

Frame Relay

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Technical

Organizational

Administrative