Overall Questions (15 random)

You got 6 of 19 possible points.
Your score was: 32 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Presentation

Transport

Datalink

Network

Score 0 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Mandatory access control

Access List Control

Owner set access control

Need-to-Know control

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

Frame Relay

SONET

MPLS

SMDS

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Visual

Organizational

Technical

Physical

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

one of the Wilson-Adder Need types

a Wide Array Node

a Wide Area Network

a Working Authentication Name

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Exposure

incorrect

Entity that can exploit a vulnerability

Threat

incorrect

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat agent

incorrect
Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Finger scanning

Iris Scanning

Badge Scanning

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

ATM

SONET

MPLS

Frame Relay

SMDS

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

SONET

SMDS

Frame Relay

MPLS

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

B

A

D

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

CHAP

LDAP

PAP

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Owner

Organizational

Physical

Administrative

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

C

A

D

B