Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Organizational

Administrative

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Detective

Compensating

Corrective

Recovery

Preventative

Score 0 of 1

Question:

Which classification of fuel type is a computer given?

Response:

B

A

C

D

Score 0 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Corrective

incorrect

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Compensating

Detective

Preventative

Recovery

Corrective

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Both Technical and Administrative

Physical Controls

Technical controls

Score 1 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Network

Transport

Datalink

Presentation

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

ring

star

bus

mesh

Score 0 of 1

Question:

Owner-set permissions are an example of:

Response:

mandatory access control

role-based access control

Discretionary access control

Clark-Wilson

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Detective

Deterrent

Recovery

Corrective