Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Badge Scanning

Finger scanning

Iris Scanning

Hand scanning

Score 0 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

B

C

D

A

Score 1 of 1

Question:

Which classification of fuel type is grease given?

Response:

A

D

B

C

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Session

Network

Physical

Data Link

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Exposure

incorrect

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Threat

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

8

6

7

5

10

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Confidentialty

Authentication

Availability

Accessibility

Data Integrity

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

OpenVPN

SESAME

KERBEROS

TACACS

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

Clark-Wilson

role-based access control

mandatory access control

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Session

Application

Data Link

Transport

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Presentation

Datalink

Session

Network

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the system

the role

the owner

network ACL

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electro-mechanical

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect