Overall Questions (15 random)

You got 12 of 19 possible points.
Your score was: 63 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Transport

Physical

Data Link

Session

Network

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

B

C

A

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Preventative

Deterrent

Recovery

Detective

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

D

A

B

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Technical

Organizational

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Datalink

Presentation

Session

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

5

8

7

6

10

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

C

B

A

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

role-based access control

Discretionary access control

mandatory access control

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Quantum cryptography

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electro-mechanical

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

TACACS

OpenVPN

SESAME

Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Session

Transport

Data Link

Application