Overall Questions (15 random)

You got 6 of 19 possible points.
Your score was: 32 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1
(skipped)

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

PAP

CHAP

EAP

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Preventative

Recovery

Deterrent

Detective

Score 0 of 1

Question:

Which classification of fuel type is paper given?

Response:

C

D

A

B

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Transport

Physical

Network

Presentation

Data Link

Score 0 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

Discretionary access control

role-based access control

Clark-Wilson

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Unauthorized viewing of information (screen peeking)

incorrect

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

Cost to implement

Initial Registration

User acceptance

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Ear shape/pattern

Retinal imagery

Voice

Score 0 of 1

Question:

Which access control includes cameras?

Response:

Visual

Physical

Administrative

Organizational

Technical

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Rijndael's Challenge

Diffe-Hillman's Axiom

Kerckhoff's Principle

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

B

C

D

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Network

Presentation

Transport

Datalink

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SONET

Frame Relay

ATM

MPLS

SMDS