Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Physical

Technical

Organizational

Owner

Administrative

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Technical

Administrative

Organizational

Physical

Visual

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Corrective

Recovery

Compensating

Preventative

Detective

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Data Link

Network

Session

Physical

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Administrative Controls

Technical controls

Both Technical and Administrative

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

A

B

C

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Ear shape/pattern

Voice

Retinal imagery

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Preventive

incorrect

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Preventative

Compensating

Recovery

Corrective

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Rijndael's Challenge

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Cost to implement

User acceptance

Rings/Weight change

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Need-to-Know control

Mandatory access control

Access List Control

Owner set access control

Role-based access control

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KErberos

SESAME

KryptoKnight

LDAP

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Deterrent

Corrective

Preventative

Recovery

Detective