Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Techincal

Technical

Organizational

Owner

Physical

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Soda Acid

Water

CO2

ESD Blanket

Score 0 of 1
(skipped)

Question:

Which classification of fuel type is a computer given?

Response:

C

B

A

D

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

SONET

SMDS

ATM

MPLS

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KryptoKnight

SESAME

LDAP

KErberos

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Operating System Controls/Policies

Data Access Controls

Firewalls/IPS

Access Control Lists

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Physical

Administrative

Authentication

Technical

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Compensating

Preventative

Corrective

Recovery

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

ring

bus

2 layer star

star

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

A

C

B

D

Score 0 of 1

Question:

What is the ideal humidity level for a data center?

Response:

40-60%

30-50%

60-80%

20-40%

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Rijndael's Challenge

Moore's Law

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

Initial Registration

User acceptance

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Administrative controls

Both technical and administrative controls

Technical controls

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

5

8

6

10

7