Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the owner

the system

network ACL

the GPO

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Operating System Controls/Policies

Data Access Controls

System Access Controls

Access Control Lists

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

A

B

C

D

Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Manager set control

Access List Control

Role-based access control

Discretionary access control

Mandatory access control

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Accessibility

Confidentialty

Address Integrity

Availability

Authentication

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

a Wide Area Network

a Wide Array Node

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

FRA or Type IV error

FAR or Type II error

CER or Type III error

Score 0 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Organizational

Technical

Physical

Visual

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

EAP

PAP

CHAP

Score 0 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

B

D

A

C

Score 1 of 1

Question:

A LAN is

Response:

a Linear Applebaum Network diagram

a Local Account Name

a Local Area Network

a Least Access Notification

a Local Authentication Node

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

CO2

Water

Soda Acid