Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Technical controls

Administrative controls

Physical controls

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

John the Ripper

Packet sniffing

brute force/dictionary attack

LophtCrack

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Finger scanning

Iris Scanning

Badge Scanning

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

CHAP

EAP

LDAP

PAP

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Detective

Preventative

Corrective

Recovery

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Administrative

Technical

Organizational

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Administrative

Organizational

Owner

Physical

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Network

Data Link

Application

Transport

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

Initial Registration

Cost to implement

User acceptance

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Availability

Authentication

Data Integrity

Accessibility

Confidentialty

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Organizational

Administrative

Physical

Technical

Techincal

Owner

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Moore's Law

Diffe-Hillman's Axiom

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Transport

Presentation

Datalink

Application

Network

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Presentation

Transport

Application

Datalink

Network

Score 0 of 1

Question:

What is the ideal humidity level for a data center?

Response:

60-80%

30-50%

20-40%

40-60%