Overall Questions (15 random)

You got 11 of 19 possible points.
Your score was: 58 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Physical

Owner

Administrative

Organizational

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Physical controls

Both Technical and Administrative controls

Administrative controls

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Recovery

Corrective

Preventative

Compensating

Detective

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Preventive

incorrect
Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Data Access Controls

Operating System Controls/Policies

System Access Controls

Access Control Lists

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Need-to-Know control

Role-based access control

Access List Control

Mandatory access control

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

TACACS

OpenVPN

SESAME

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Data Link

Presentation

Transport

Network

Physical

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

Discretionary access control

role-based access control

mandatory access control

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Address Integrity

Accessibility

Confidentialty

Authentication

Availability

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

A

D

C

B

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

SESAME

KryptoKnight

KErberos