Overall Questions (15 random)

You got 8 of 19 possible points.
Your score was: 42 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

CHAP

EAP

PAP

LDAP

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

C

B

A

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

role-based access control

Discretionary access control

mandatory access control

Score 0 of 1
(skipped)

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KErberos

SESAME

KryptoKnight

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SONET

MPLS

Frame Relay

SMDS

ATM

Score 0 of 1

Question:

Which access control includes motion detectors?

Response:

Authentication

Physical

Technical

Organizational

Administrative

Score 0 of 1
(skipped)

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

FAR or Type II error

CER or Type III error

FRA or Type IV error

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Session

Physical

Network

Transport

Data Link

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

7

8

5

10

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Both technical and administrative controls

Technical controls

Administrative controls

Score 0 of 1
(skipped)

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Technical

Organizational

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electro-mechanical

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

MPLS

ATM

Frame Relay

SMDS

SONET