Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Presentation

Network

Datalink

Application

Score 1 of 1

Question:

A WAN is

Response:

one of the Wilson-Adder Need types

a Wide Array Node

the Westinghouse Address Naming convention

a Working Authentication Name

a Wide Area Network

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Manager set control

Role-based access control

Access List Control

Mandatory access control

Discretionary access control

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Iris Scanning

Finger scanning

Badge Scanning

Hand scanning

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FRR or Type I error

FAR or Type II error

FRA or Type IV error

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the role

the owner

the system

the GPO

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

Clark-Wilson

role-based access control

mandatory access control

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Owner

Physical

Organizational

Technical

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Datalink

Network

Transport

Presentation

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Owner

Technical

Administrative

Physical

Organizational

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Technical controls

Physical controls

Both Technical and Administrative controls

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Compensating

Corrective

Recovery

Preventative

Detective

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

Frame Relay

ATM

MPLS

SMDS

SONET