Overall Questions (15 random)

You got 7 of 19 possible points.
Your score was: 37 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Technical controls

Physical controls

Administrative controls

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Technical controls

Physical Controls

Both Technical and Administrative

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

CHAP

EAP

LDAP

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Rings/Weight change

User acceptance

Cost to implement

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Technical controls

Both Technical and Administrative controls

Administrative controls

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 0 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

D

A

C

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Datalink

Network

Transport

Presentation

Session

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Administrative

Organizational

Score 1 of 1

Question:

A WAN is

Response:

a Wide Area Network

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

a Wide Array Node

a Working Authentication Name

Score 0 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Network

Presentation

Data Link

Transport

Physical

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electro-mechanical

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Manual

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

SESAME

KryptoKnight

KErberos

LDAP

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

ATM

Frame Relay

MPLS

SONET