Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 5
(skipped)

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

D

C

B

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

OpenVPN

SESAME

KERBEROS

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Operating System Controls/Policies

Firewalls/IPS

System Access Controls

Data Access Controls

Access Control Lists

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Ear shape/pattern

Retinal imagery

Voice

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

C

D

B

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

Water

Soda Acid

ESD Blanket

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Compensating

incorrect
Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Discretionary access control

Manager set control

Mandatory access control

Access List Control

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

10

6

7

5

8

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Preventative

Detective

Recovery

Compensating

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Authentication

Administrative

Technical

Physical

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

MPLS

SONET

ATM

Frame Relay

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Both Technical and Administrative controls

Technical controls

Physical controls

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

SMDS

Frame Relay

SONET

ATM

MPLS