Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FAR or Type II error

FRR or Type I error

FRA or Type IV error

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Recovery

Corrective

Preventative

Deterrent

Detective

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Technical

Administrative

Physical

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Both Technical and Administrative

Physical Controls

Technical controls

Administrative Controls

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

7

10

6

8

5

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Preventative

incorrect

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Mandatory access control

Role-based access control

Discretionary access control

Access List Control

Manager set control

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1
(skipped)

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

MPLS

SONET

SMDS

ATM

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Session

Transport

Network

Physical

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Vulnerability

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Compensating

Preventative

Detective

Corrective

Recovery

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Technical

Organizational

Physical

Owner

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

C

D

A