Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

SESAME

KERBEROS

TACACS

OpenVPN

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Recovery

Compensating

Preventative

Corrective

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Both Technical and Administrative controls

Administrative controls

Physical controls

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

Frame Relay

SONET

MPLS

SMDS

Score 0 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

A

B

C

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Preventative

Corrective

Recovery

Deterrent

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

A

C

D

B

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Presentation

Datalink

Transport

Application

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Accessibility

Availability

Confidentialty

Authentication

Address Integrity

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

MPLS

SMDS

Frame Relay

SONET

ATM

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Diffe-Hillman's Axiom

Rijndael's Challenge

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

one of the Wilson-Adder Need types

a Wide Area Network

the Westinghouse Address Naming convention

a Wide Array Node

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Need-to-Know control

Owner set access control

Role-based access control

Access List Control

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Authentication

Accountability