Overall Questions (15 random)

You got 8 of 15 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Organizational

Physical

Owner

Administrative

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Technical

Owner

Physical

Administrative

Organizational

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the role

network ACL

the GPO

the owner

the system

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

7

5

8

10

6

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Network

Data Link

Transport

Session

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Transport

Presentation

Network

Session

Datalink

Score 1 of 1

Question:

A WAN is

Response:

a Wide Array Node

a Wide Area Network

a Working Authentication Name

one of the Wilson-Adder Need types

the Westinghouse Address Naming convention

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Technical

Organizational

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Rijndael's Challenge

Diffe-Hillman's Axiom

Moore's Law

Score 0 of 1

Question:

Which classification of fuel type is wood given?

Response:

D

C

A

B

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Compensating

Corrective

Detective

Recovery

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Cost to implement

Rings/Weight change

User acceptance

Score 0 of 1

Question:

Which access control includes motion detectors?

Response:

Authentication

Administrative

Technical

Physical

Organizational

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Exposure

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Vulnerability

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Threat

incorrect