Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Transport

Datalink

Presentation

Application

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Organizational

Administrative

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

CO2

Water

Soda Acid

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Administrative

Technical

Organizational

Authentication

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

SESAME

TACACS

OpenVPN

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Administrative controls

Both Technical and Administrative controls

Technical controls

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the system

the owner

network ACL

the GPO

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

MPLS

SONET

ATM

SMDS

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Rijndael's Challenge

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

MPLS

SMDS

Frame Relay

SONET

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Authentication

Accessibility

Data Integrity

Confidentialty

Availability

Score 1 of 1

Question:

Which access control includes training?

Response:

Administrative

Technical

Organizational

Physical

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

10

7

5

8

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct