Overall Questions (15 random)

You got 11 of 19 possible points.
Your score was: 58 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Organizational

Owner

Physical

Administrative

Technical

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

mandatory access control

Discretionary access control

role-based access control

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Technical

Organizational

Physical

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Soda Acid

ESD Blanket

CO2

Water

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Preventative

Compensating

Corrective

Detective

Recovery

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

SONET

SMDS

ATM

MPLS

Score 1 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

CHAP

EAP

LDAP

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

A

C

D

B

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Authentication

Administrative

Physical

Technical

Organizational

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Presentation

Datalink

Transport

Network

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Heat/Combustion/Oxygen

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Data Link

Network

Application

Transport

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

B

C

D

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 0 of 5
(skipped)

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect