Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Organizational

Technical

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRR or Type I error

CER or Type III error

FRA or Type IV error

FAR or Type II error

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Authentication

Physical

Administrative

Technical

Organizational

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

mandatory access control

Clark-Wilson

Discretionary access control

Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Deterrent

incorrect

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Preventative

incorrect

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Retinal imagery

Voice

Hand shape/pattern

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Network

Application

Presentation

Datalink

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Deterrent

Detective

Recovery

Corrective

Preventative

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

30-50%

20-40%

60-80%

40-60%

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Technical controls

Administrative controls

Both technical and administrative controls

Physical controls

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the owner

the GPO

the system

the role

network ACL

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

star

bus

mesh

ring

2 layer star

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Technical controls

Administrative controls

Both Technical and Administrative controls

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Accessibility

Data Integrity

Availability

Confidentialty

Authentication