Overall Questions (15 random)

You got 7 of 15 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

A WAN is

Response:

a Wide Array Node

the Westinghouse Address Naming convention

one of the Wilson-Adder Need types

a Wide Area Network

a Working Authentication Name

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

B

A

C

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Technical controls

Both Technical and Administrative

Physical Controls

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Administrative controls

Technical controls

Both technical and administrative controls

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Exposure

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

mandatory access control

role-based access control

Clark-Wilson

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Moore's Law

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Diffe-Hillman's Axiom

Rijndael's Challenge

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Transport

Presentation

Application

Datalink

Network

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Data Access Controls

Firewalls/IPS

System Access Controls

Access Control Lists

Operating System Controls/Policies

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

CO2

Water

Soda Acid

Score 0 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Data Link

Transport

Physical

Presentation

Network

Score 0 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Detective

Compensating

Recovery

Preventative

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Retinal imagery

Ear shape/pattern

Voice