Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Heat/Combustion/Oxygen

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Retinal imagery

Voice

Ear shape/pattern

Hand shape/pattern

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

MAC the Knife

John the Ripper

Packet sniffing

LophtCrack

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Physical

Organizational

Technical

Score 0 of 1

Question:

Which of the following have the best CER?

Response:

Finger scanning

Iris Scanning

Badge Scanning

Hand scanning

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

20-40%

60-80%

30-50%

40-60%

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

star

ring

2 layer star

bus

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Application

Data Link

Network

Transport

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Presentation

Datalink

Transport

Network

Session

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

SONET

SMDS

ATM

MPLS

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Owner set access control

Role-based access control

Access List Control

Need-to-Know control

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Accessibility

Authentication

Address Integrity

Confidentialty

Availability

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

7

10

8

6

5