Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Physical

Technical

Organizational

Owner

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

D

C

A

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Recovery

Compensating

Corrective

Detective

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Combustion/Oxygen

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 0 of 1

Question:

What is the ideal humidity level for a data center?

Response:

40-60%

60-80%

30-50%

20-40%

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Owner

Administrative

Organizational

Physical

Technical

Techincal

Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Technical controls

Administrative controls

Both technical and administrative controls

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Recovery

Corrective

Detective

Compensating

Preventative

Score 0 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Both Technical and Administrative

Technical controls

Physical Controls

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Technical

Administrative

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Data Access Controls

Access Control Lists

System Access Controls

Operating System Controls/Policies

Firewalls/IPS

Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Mandatory access control

Role-based access control

Access List Control

Discretionary access control

Manager set control

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Exposure

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct