Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

Discretionary access control

role-based access control

mandatory access control

Score 1 of 1

Question:

A LAN is

Response:

a Least Access Notification

a Local Account Name

a Linear Applebaum Network diagram

a Local Area Network

a Local Authentication Node

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

bus

mesh

2 layer star

ring

star

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FAR or Type II error

FRA or Type IV error

FRR or Type I error

Score 1 of 1

Question:

Which access control includes training?

Response:

Technical

Administrative

Organizational

Physical

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

SMDS

MPLS

Frame Relay

SONET

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

C

B

D

A

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Iris Scanning

Badge Scanning

Finger scanning

Hand scanning

Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Transport

Physical

Session

Network

Data Link

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Transport

Application

Datalink

Network

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Mandatory access control

Access List Control

Role-based access control

Manager set control

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Compensating

Detective

Recovery

Corrective

Preventative

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Data Integrity

Confidentialty

Accessibility

Authentication

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Kerckhoff's Principle