Overall Questions (15 random)

You got 12 of 19 possible points.
Your score was: 63 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Mechanical

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Presentation

Datalink

Transport

Application

Network

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Administrative controls

Technical controls

Physical controls

Both Technical and Administrative controls

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Technical

Administrative

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

CO2

Water

Soda Acid

ESD Blanket

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Discretionary access control

mandatory access control

Clark-Wilson

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law

Rijndael's Challenge

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Hand scanning

Finger scanning

Badge Scanning

Iris Scanning

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Recovery

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which access control includes cameras?

Response:

Physical

Technical

Organizational

Administrative

Visual

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SMDS

ATM

SONET

Frame Relay

MPLS

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Detective

Compensating

Recovery

Preventative

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Combustion/Oxygen

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Fuel/Oxygen

Score 1 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Accessibility

Availability

Authentication

Address Integrity

Confidentialty