Overall Questions (15 random)

You got 13 of 19 possible points.
Your score was: 68 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Wide Array Node

one of the Wilson-Adder Need types

a Wide Area Network

a Working Authentication Name

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Diffe-Hillman's Axiom

Rijndael's Challenge

Kerckhoff's Principle

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FAR or Type II error

FRA or Type IV error

FRR or Type I error

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Recovery

Preventative

Detective

Corrective

Deterrent

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Presentation

Network

Transport

Data Link

Physical

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

MPLS

ATM

SONET

SMDS

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Data Link

Application

Transport

Network

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Organizational

Physical

Administrative

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Owner

Organizational

Administrative

Techincal

Technical

Physical

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

ESD Blanket

Water

Soda Acid

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Confidentialty

Data Integrity

Authentication

Availability

Accessibility

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

bus

ring

mesh

2 layer star

star

Score 0 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

A

D

C

B