Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FRA or Type IV error

FAR or Type II error

FRR or Type I error

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Organizational

Administrative

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Owner

Technical

Physical

Administrative

Organizational

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

star

bus

2 layer star

ring

mesh

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

Packet sniffing

MAC the Knife

John the Ripper

LophtCrack

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Diffe-Hillman's Axiom

Rijndael's Challenge

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Organizational

Physical

Owner

Administrative

Technical

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Technical

Physical

Administrative

Owner

Organizational

Techincal

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Application

Data Link

Network

Transport

Session

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Initial Registration

Rings/Weight change

User acceptance

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Access List Control

Role-based access control

Need-to-Know control

Owner set access control

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Network

Transport

Data Link

Physical

Session

Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Discretionary access control

Mandatory access control

Manager set control

Access List Control

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Recovery

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct