Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

A

D

C

B

Score 0 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

C

D

A

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Retinal imagery

Hand shape/pattern

Voice

Score 0 of 1

Question:

Which classification of fuel type is paper given?

Response:

B

A

C

D

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Operating System Controls/Policies

Firewalls/IPS

Data Access Controls

Access Control Lists

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Organizational

Physical

Administrative

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Technical controls

Administrative controls

Both Technical and Administrative controls

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

CHAP

PAP

LDAP

EAP

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Authentication

Accessibility

Availability

Data Integrity

Confidentialty

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Owner set access control

Mandatory access control

Access List Control

Need-to-Know control

Role-based access control

Score 1 of 1

Question:

Which access control includes asset classification?

Response:

Technical

Owner

Physical

Organizational

Administrative

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

mesh

ring

star

bus

2 layer star

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Transport

Data Link

Network

Physical