Overall Questions (15 random)

You got 13 of 19 possible points.
Your score was: 68 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

ATM

Frame Relay

MPLS

SONET

SMDS

Score 0 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Authentication

Physical

Administrative

Technical

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Rijndael's Challenge

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

B

A

D

C

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

30-50%

40-60%

60-80%

20-40%

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the GPO

the system

the role

the owner

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Physical

Network

Transport

Session

Score 1 of 1

Question:

A LAN is

Response:

a Linear Applebaum Network diagram

a Local Area Network

a Least Access Notification

a Local Account Name

a Local Authentication Node

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

ring

star

2 layer star

bus

mesh

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

Discretionary access control

role-based access control

mandatory access control

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Transport

Application

Network

Data Link

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Mechanical

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Manual

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Both Technical and Administrative

Administrative Controls

Technical controls

Physical Controls