Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Corrective

Recovery

Deterrent

Detective

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

D

C

B

A

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

SONET

MPLS

Frame Relay

SMDS

Score 0 of 5
(skipped)

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Detective

Compensating

Corrective

Preventative

Recovery

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Owner

Administrative

Technical

Organizational

Physical

Score 1 of 1

Question:

Which access control includes training?

Response:

Administrative

Physical

Organizational

Technical

Score 0 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

Water

ESD Blanket

Soda Acid

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

C

A

B

D

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Data Integrity

Authentication

Confidentialty

Availability

Accessibility

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 0 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Recovery

incorrect

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Presentation

Datalink

Network

Transport

Session

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Authentication

Confidentialty

Availability

Accessibility

Address Integrity