Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which access control includes training?

Response:

Administrative

Physical

Technical

Organizational

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electro-mechanical

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Presentation

Datalink

Network

Transport

Application

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Physical controls

Both Technical and Administrative controls

Technical controls

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Technical controls

Both Technical and Administrative

Physical Controls

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

CO2

Water

Soda Acid

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the owner

the GPO

the system

network ACL

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Application

Transport

Datalink

Network

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Data Link

Session

Network

Transport

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Deterrent

Detective

Corrective

Recovery

Preventative

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

SESAME

TACACS

OpenVPN

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

SONET

SMDS

Frame Relay

MPLS

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Rijndael's Challenge

Moore's Law

Diffe-Hillman's Axiom

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Transport

Session

Datalink

Network

Presentation