Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Administrative

Organizational

Technical

Authentication

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Both Technical and Administrative

Technical controls

Physical Controls

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

B

D

A

Score 0 of 1
(skipped)

Question:

Clark-Wilson focuses primarily on:

Response:

Address Integrity

Confidentialty

Availability

Authentication

Accessibility

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FAR or Type II error

CER or Type III error

FRR or Type I error

FRA or Type IV error

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

PAP

CHAP

EAP

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Organizational

Technical

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Corrective

Preventative

Compensating

Detective

Recovery

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Diffe-Hillman's Axiom

Rijndael's Challenge

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

A

C

D

B

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Presentation

Network

Datalink

Session

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

network ACL

the system

the role

the owner

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Deterrent

Detective

Preventative

Recovery