Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which classification of fuel type is wood given?

Response:

D

C

B

A

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

C

B

A

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

7

10

6

8

5

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Access List Control

Role-based access control

Discretionary access control

Manager set control

Mandatory access control

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Owner

Physical

Administrative

Organizational

Technical

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Network

Physical

Presentation

Transport

Data Link

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

D

C

A

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Technical

Administrative

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Rijndael's Challenge

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Preventive

incorrect

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

Frame Relay

ATM

SONET

MPLS

SMDS

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

LophtCrack

John the Ripper

Packet sniffing

MAC the Knife

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

Discretionary access control

role-based access control

mandatory access control

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Datalink

Network

Presentation

Transport