Overall Questions (15 random)

You got 14 of 19 possible points.
Your score was: 74 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

B

C

D

A

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

B

A

C

D

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Mandatory access control

Role-based access control

Manager set control

Access List Control

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

Frame Relay

MPLS

SONET

ATM

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Discretionary access control

mandatory access control

Clark-Wilson

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

Frame Relay

SMDS

ATM

SONET

MPLS

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Compensating

incorrect

Correcting violations and incidents

Preventative

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Detective

incorrect

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Accessibility

Availability

Authentication

Data Integrity

Confidentialty

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Physical

Owner

Technical

Organizational

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Physical

Data Link

Network

Session

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Accessibility

Address Integrity

Availability

Confidentialty

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the system

the role

network ACL

the GPO

the owner