Overall Questions (15 random)

You got 11 of 19 possible points.
Your score was: 58 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Session

Network

Transport

Physical

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Accessibility

Address Integrity

Availability

Confidentialty

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Technical

Organizational

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Recovery

Detective

Deterrent

Preventative

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

the Westinghouse Address Naming convention

one of the Wilson-Adder Need types

a Wide Area Network

a Wide Array Node

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRA or Type IV error

FAR or Type II error

FRR or Type I error

CER or Type III error

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Both Technical and Administrative

Technical controls

Administrative Controls

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Session

Transport

Application

Data Link

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Manual

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

C

D

B

A

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Administrative controls

Physical controls

Both Technical and Administrative controls

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SONET

Frame Relay

SMDS

MPLS

ATM

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Organizational

Administrative

Physical

Techincal

Owner

Technical

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Session

Presentation

Network