Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

A

B

C

D

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

B

C

A

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Transport

Presentation

Network

Datalink

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Recovery

Compensating

Preventative

Detective

Corrective

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

LDAP

CHAP

PAP

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Exposure

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Rijndael's Challenge

Moore's Law

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Confidentialty

Data Integrity

Authentication

Accessibility

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Availability

Authentication

Confidentialty

Accessibility

Address Integrity

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electro-mechanical

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Application

Session

Transport

Network

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FAR or Type II error

FRA or Type IV error

CER or Type III error

FRR or Type I error

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Datalink

Presentation

Session

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Physical controls

Technical controls

Administrative controls