Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Corrective

Detective

Preventative

Recovery

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Manual

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Administrative

Technical

Authentication

Physical

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Diffe-Hillman's Axiom

Rijndael's Challenge

Moore's Law

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Session

Network

Physical

Data Link

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Compensating

Corrective

Recovery

Preventative

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Owner

Organizational

Technical

Administrative

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

bus

mesh

ring

star

2 layer star

Score 0 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

mandatory access control

Clark-Wilson

role-based access control

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Voice

Retinal imagery

Hand shape/pattern

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Exposure

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Need-to-Know control

Owner set access control

Access List Control

Mandatory access control

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Confidentialty

Address Integrity

Availability

Authentication

Accessibility

Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Application

Transport

Network

Session

Data Link

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Presentation

Network

Datalink

Transport