Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which access control includes cameras?

Response:

Technical

Organizational

Physical

Administrative

Visual

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Rijndael's Challenge

Moore's Law

Diffe-Hillman's Axiom

Kerckhoff's Principle

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

John the Ripper

LophtCrack

Packet sniffing

brute force/dictionary attack

MAC the Knife

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SONET

SMDS

ATM

Frame Relay

MPLS

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

SMDS

Frame Relay

ATM

SONET

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

Clark-Wilson

mandatory access control

role-based access control

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

User acceptance

Initial Registration

Rings/Weight change

Cost to implement

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Technical

Organizational

Administrative

Authentication

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Confidentialty

Availability

Accessibility

Authentication

Address Integrity

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

network ACL

the system

the owner

the role

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Hand shape/pattern

Ear shape/pattern

Retinal imagery

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

C

A

B

D