Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Detective

Corrective

Preventative

Deterrent

Recovery

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

B

A

D

C

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Administrative controls

Both Technical and Administrative controls

Physical controls

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Access Control Lists

Data Access Controls

System Access Controls

Operating System Controls/Policies

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Availability

Confidentialty

Accessibility

Address Integrity

Authentication

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Threat

incorrect

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

C

B

D

A

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Retinal imagery

Voice

Hand shape/pattern

Ear shape/pattern

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Technical

Administrative

Organizational

Score 1 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

MPLS

SONET

Frame Relay

ATM

SMDS

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Transport

Network

Application

Session

Score 1 of 1

Question:

A LAN is

Response:

a Local Area Network

a Local Account Name

a Local Authentication Node

a Linear Applebaum Network diagram

a Least Access Notification

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Moore's Law

Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

MPLS

SONET

Frame Relay

ATM

SMDS