Overall Questions (15 random)

You got 15 of 19 possible points.
Your score was: 79 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Need-to-Know control

Owner set access control

Mandatory access control

Access List Control

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Physical Controls

Both Technical and Administrative

Administrative Controls

Technical controls

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Soda Acid

Water

ESD Blanket

CO2

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Accessibility

Availability

Data Integrity

Confidentialty

Authentication

Score 0 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Initial Registration

User acceptance

Rings/Weight change

Cost to implement

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

C

B

D

A

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Network

Datalink

Presentation

Application

Transport

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Physical controls

Administrative controls

Technical controls

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

PAP

CHAP

LDAP

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Organizational

Technical

Administrative

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Data Access Controls

Firewalls/IPS

Access Control Lists

Operating System Controls/Policies

Score 0 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Corrective

Preventative

Detective

Recovery

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Heat/Combustion/Oxygen