Overall Questions (15 random)

You got 13 of 19 possible points.
Your score was: 68 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1
(skipped)

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

MPLS

SONET

SMDS

ATM

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Exposure

incorrect

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Vulnerability

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KryptoKnight

KErberos

SESAME

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

SESAME

KERBEROS

OpenVPN

TACACS

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

40-60%

30-50%

60-80%

20-40%

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Presentation

Datalink

Network

Application

Transport

Score 0 of 1
(skipped)

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Ear shape/pattern

Retinal imagery

Hand shape/pattern

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

User acceptance

Rings/Weight change

Cost to implement

Initial Registration

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

Discretionary access control

mandatory access control

role-based access control

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Hand scanning

Iris Scanning

Badge Scanning

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Corrective

Recovery

Preventative

Compensating