Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Presentation

Network

Transport

Datalink

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

Cost to implement

User acceptance

Initial Registration

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Transport

Datalink

Presentation

Network

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Network

Transport

Data Link

Presentation

Physical

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Iris Scanning

Finger scanning

Hand scanning

Badge Scanning

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Both Technical and Administrative

Technical controls

Administrative Controls

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

MPLS

SMDS

Frame Relay

SONET

Score 0 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Physical

Organizational

Authentication

Technical

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Owner

Technical

Organizational

Administrative

Physical

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Preventative

Corrective

Compensating

Detective

Recovery

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Preventative

Compensating

Recovery

Corrective

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Exposure

incorrect

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Vulnerability

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KErberos

KryptoKnight

SESAME

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Session

Datalink

Presentation