Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Confidentialty

Authentication

Availability

Accessibility

Address Integrity

Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Administrative controls

Technical controls

Physical controls

Both technical and administrative controls

Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KErberos

SESAME

KryptoKnight

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Application

Session

Data Link

Transport

Network

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

mandatory access control

Discretionary access control

role-based access control

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

Packet sniffing

John the Ripper

LophtCrack

MAC the Knife

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Transport

Network

Presentation

Data Link

Physical

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Detective

Preventative

Compensating

Recovery

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

B

A

C

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Organizational

Owner

Technical

Administrative

Physical

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SONET

MPLS

SMDS

Frame Relay

ATM

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Compensating

Corrective

Recovery

Detective

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

star

2 layer star

ring

bus

mesh