Overall Questions (15 random)

You got 11 of 15 possible points.
Your score was: 73 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

Rings/Weight change

User acceptance

Cost to implement

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Manager set control

Discretionary access control

Role-based access control

Access List Control

Mandatory access control

Score 0 of 1

Question:

Which classification of fuel type is paper given?

Response:

C

D

B

A

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Network

Application

Data Link

Transport

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the system

network ACL

the GPO

the owner

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Authentication

Accessibility

Data Integrity

Confidentialty

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

B

C

A

D

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

Discretionary access control

role-based access control

mandatory access control

Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

OpenVPN

KERBEROS

SESAME

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Technical

Authentication

Administrative

Physical

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Need-to-Know control

Role-based access control

Owner set access control

Mandatory access control

Access List Control

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Organizational

Technical

Physical

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Preventative

Recovery

Detective

Corrective

Compensating

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

System Access Controls

Operating System Controls/Policies

Access Control Lists

Data Access Controls