Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which classification of fuel type is paper given?

Response:

B

D

A

C

Score 1 of 1

Question:

Which access control includes training?

Response:

Technical

Administrative

Physical

Organizational

Score 0 of 1

Question:

What is the ideal humidity level for a data center?

Response:

60-80%

20-40%

30-50%

40-60%

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the owner

network ACL

the system

the role

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Technical

Organizational

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Both Technical and Administrative controls

Physical controls

Administrative controls

Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Session

Network

Application

Data Link

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Detective

Corrective

Preventative

Recovery

Score 0 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

A

B

D

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Presentation

Datalink

Network

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Technical

Administrative

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Mandatory access control

Access List Control

Need-to-Know control

Role-based access control

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct