Overall Questions (15 random)

You got 8 of 19 possible points.
Your score was: 42 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

Discretionary access control

Clark-Wilson

role-based access control

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

User acceptance

Initial Registration

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Mechanical

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Manual

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Physical

Techincal

Technical

Organizational

Owner

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Need-to-Know control

Role-based access control

Access List Control

Owner set access control

Mandatory access control

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Technical

Organizational

Administrative

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Fuel/Oxygen

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Score 0 of 1

Question:

Which access control includes training?

Response:

Organizational

Physical

Administrative

Technical

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Availability

Address Integrity

Accessibility

Confidentialty

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Datalink

Presentation

Network

Transport

Application

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Organizational

Technical

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Technical

Authentication

Physical

Organizational

Administrative

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

A

D

B

C

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Physical

Administrative

Technical

Organizational

Owner

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Threat

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Vulnerability

incorrect

Presence of a vulnerability which exposes the organization

Exposure

correct