Overall Questions (15 random)

You got 11 of 19 possible points.
Your score was: 58 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Organizational

Technical

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

ATM

SMDS

MPLS

SONET

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

Clark-Wilson

mandatory access control

role-based access control

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Session

Network

Transport

Physical

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Organizational

Authentication

Administrative

Technical

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the GPO

network ACL

the owner

the system

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

B

A

C

D

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Owner

Technical

Organizational

Physical

Administrative

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Quantum cryptography

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Exposure

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

A

D

C

B

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

C

B

D