Overall Questions (15 random)

You got 7 of 15 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

Soda Acid

ESD Blanket

CO2

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Exposure

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

C

A

D

B

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Datalink

Network

Transport

Presentation

Session

Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Administrative controls

Technical controls

Physical controls

Both technical and administrative controls

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

TACACS

SESAME

OpenVPN

Score 1 of 1

Question:

A LAN is

Response:

a Local Account Name

a Local Area Network

a Least Access Notification

a Local Authentication Node

a Linear Applebaum Network diagram

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Risk

incorrect
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Mandatory access control

Access List Control

Need-to-Know control

Owner set access control

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SMDS

MPLS

Frame Relay

ATM

SONET

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Network

Datalink

Application

Transport

Score 0 of 1
(skipped)

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Technical controls

Physical Controls

Administrative Controls

Both Technical and Administrative

Score 0 of 1
(skipped)

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

incorrect

Firewalls, IDS, encryption

incorrect

Lighting, Fencing, guard patrols

incorrect
Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Both Technical and Administrative controls

Technical controls

Administrative controls

Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Mandatory access control

Manager set control

Access List Control

Discretionary access control

Role-based access control