Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Techincal

Administrative

Owner

Technical

Physical

Organizational

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Owner

Physical

Administrative

Organizational

Technical

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Transport

Presentation

Data Link

Physical

Network

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Detective

Corrective

Compensating

Recovery

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Physical

Technical

Owner

Organizational

Administrative

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

5

10

8

7

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

OpenVPN

SESAME

KERBEROS

TACACS

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

Soda Acid

Water

CO2

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Recovery

Preventative

Detective

Compensating

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

LophtCrack

John the Ripper

MAC the Knife

Packet sniffing

brute force/dictionary attack

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Deterrent

Preventative

Recovery

Corrective

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

MPLS

Frame Relay

SONET

SMDS

ATM