Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Data Link

Session

Transport

Physical

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Technical

Owner

Organizational

Administrative

Physical

Techincal

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Discretionary access control

Clark-Wilson

mandatory access control

Score 0 of 1

Question:

Which classification of fuel type is grease given?

Response:

D

C

A

B

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Network

Datalink

Presentation

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

A

B

D

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Manual

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Manual

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Quantum cryptography

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electro-mechanical

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Kerckhoff's Principle

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Compensating

Corrective

Preventative

Recovery

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

SESAME

LDAP

KryptoKnight

KErberos

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Administrative controls

Both technical and administrative controls

Physical controls

Technical controls

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Recovery

Corrective

Preventative

Detective

Deterrent

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Access List Control

Manager set control

Mandatory access control

Role-based access control

Discretionary access control