Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which access control includes cameras?

Response:

Organizational

Physical

Visual

Technical

Administrative

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

MAC the Knife

Packet sniffing

LophtCrack

brute force/dictionary attack

John the Ripper

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authorization

Accountability

Authentication

Score 1 of 1

Question:

Which access control includes intrusion detection?

Response:

Administrative

Technical

Physical

Organizational

Techincal

Owner

Score 0 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Confidentialty

Data Integrity

Authentication

Availability

Accessibility

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Accessibility

Address Integrity

Confidentialty

Authentication

Availability

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

C

D

A

B

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Voice

Ear shape/pattern

Retinal imagery

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

D

C

A

B

Score 0 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Preventative

Compensating

Detective

Recovery

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which of the following is a remote authentication system?

Response:

KERBEROS

OpenVPN

SESAME

TACACS