Overall Questions (15 random)

You got 6 of 19 possible points.
Your score was: 32 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Accessibility

Confidentialty

Authentication

Data Integrity

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

one of the Wilson-Adder Need types

a Wide Array Node

a Wide Area Network

the Westinghouse Address Naming convention

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Session

Transport

Network

Data Link

Physical

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the system

the role

network ACL

the GPO

the owner

Score 0 of 5
(skipped)

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Discretionary access control

Clark-Wilson

mandatory access control

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Physical

Authentication

Administrative

Technical

Score 0 of 1
(skipped)

Question:

Which classification of fuel type is grease given?

Response:

D

B

C

A

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Transport

Network

Physical

Session

Score 0 of 1
(skipped)

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

PAP

CHAP

EAP

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Risk

incorrect
Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Recovery

Detective

Corrective

Deterrent

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Datalink

Presentation

Transport

Session

Network

Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Role-based access control

Mandatory access control

Access List Control

Manager set control