Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

SESAME

KErberos

LDAP

KryptoKnight

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Risk

incorrect
Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SONET

Frame Relay

SMDS

ATM

MPLS

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

C

D

B

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Recovery

Deterrent

Corrective

Detective

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

John the Ripper

LophtCrack

Packet sniffing

brute force/dictionary attack

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Organizational

Techincal

Technical

Physical

Owner

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

C

B

A

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Organizational

Physical

Technical

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Network

Datalink

Presentation

Application

Transport

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

A

B

C

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Need-to-Know control

Access List Control

Role-based access control

Mandatory access control

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Organizational

Administrative

Technical