Overall Questions (15 random)

You got 8 of 15 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

PAP

CHAP

LDAP

Score 0 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Data Integrity

Availability

Accessibility

Confidentialty

Authentication

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Recovery

Compensating

Preventative

Detective

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Network

Session

Presentation

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Which of the following is primarily focused on identifying violations and incidents?

Response:

Compensating

Detective

Recovery

Corrective

Preventative

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Application

Network

Datalink

Transport

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Administrative

Organizational

Physical

Owner

Technical

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

C

B

A

D

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Technical

Owner

Physical

Organizational

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

C

D

B

A

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Deterrent

Recovery

Detective

Preventative

Corrective

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Datalink

Transport

Application

Presentation

Network

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

brute force/dictionary attack

MAC the Knife

John the Ripper

Packet sniffing

LophtCrack

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct