Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

User acceptance

Initial Registration

Cost to implement

Rings/Weight change

Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Transport

Physical

Network

Data Link

Session

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Technical

Physical

Organizational

Administrative

Owner

Techincal

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

MPLS

Frame Relay

SONET

ATM

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Data Access Controls

Access Control Lists

Operating System Controls/Policies

Firewalls/IPS

System Access Controls

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Badge Scanning

Finger scanning

Hand scanning

Iris Scanning

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

SONET

MPLS

ATM

SMDS

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Manager set control

Mandatory access control

Role-based access control

Access List Control

Discretionary access control

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

A

B

C

D

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

ring

2 layer star

bus

star

mesh

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Technical controls

Administrative controls

Both technical and administrative controls

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the owner

network ACL

the system

the role

the GPO

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

the Westinghouse Address Naming convention

a Wide Array Node

one of the Wilson-Adder Need types

a Wide Area Network

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

CO2

Soda Acid

ESD Blanket

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

10

5

7

8

6