Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which access control includes training?

Response:

Technical

Organizational

Physical

Administrative

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Network

Data Link

Session

Transport

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

C

B

D

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

CHAP

PAP

LDAP

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Physical controls

Administrative controls

Technical controls

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Hand scanning

Badge Scanning

Iris Scanning

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Detective

Compensating

Recovery

Preventative

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Transport

Application

Network

Datalink

Presentation

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Administrative controls

Technical controls

Both technical and administrative controls

Score 3 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Electro-mechanical

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Physical

Owner

Technical

Organizational

Administrative

Techincal

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

SESAME

KryptoKnight

KErberos