Overall Questions (15 random)

You got 8 of 15 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Recovery

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Detective

incorrect

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Technical controls

Physical controls

Administrative controls

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Technical

Administrative

Organizational

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

5

8

6

7

10

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Data Link

Network

Application

Transport

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Accessibility

Data Integrity

Authentication

Availability

Confidentialty

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Confidentialty

Authentication

Accessibility

Address Integrity

Availability

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Mandatory access control

Discretionary access control

Access List Control

Manager set control

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Risk

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Risk

incorrect
Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Transport

Datalink

Presentation

Application

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

bus

star

mesh

ring

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

User acceptance

Rings/Weight change

Initial Registration

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Operating System Controls/Policies

Access Control Lists

Firewalls/IPS

Data Access Controls

System Access Controls