Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

SONET

MPLS

SMDS

ATM

Frame Relay

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

star

bus

2 layer star

ring

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

Frame Relay

MPLS

ATM

SONET

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Presentation

Network

Session

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Authentication

Accountability

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

D

A

B

C

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Retinal imagery

Ear shape/pattern

Hand shape/pattern

Score 0 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Detective

Recovery

Compensating

Preventative

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Technical

Administrative

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Deterrent

Corrective

Preventative

Detective

Recovery

Score 1 of 1

Question:

A LAN is

Response:

a Least Access Notification

a Linear Applebaum Network diagram

a Local Account Name

a Local Area Network

a Local Authentication Node

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Network

Transport

Data Link

Physical

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

CHAP

EAP

LDAP

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Threat agent

incorrect

Presence of a vulnerability which exposes the organization

Exposure

correct