Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Application

Network

Transport

Data Link

Session

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

60-80%

40-60%

30-50%

20-40%

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Organizational

Administrative

Authentication

Technical

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

Frame Relay

ATM

MPLS

SONET

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Manual

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the owner

the role

the system

network ACL

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Firewalls/IPS

Operating System Controls/Policies

Access Control Lists

Data Access Controls

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Network

Transport

Datalink

Presentation

Application

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

EAP

LDAP

CHAP

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Voice

Retinal imagery

Ear shape/pattern

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

role-based access control

Discretionary access control

Clark-Wilson

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Technical controls

Physical Controls

Both Technical and Administrative

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FAR or Type II error

FRR or Type I error

CER or Type III error

FRA or Type IV error

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

D

A

C

B