Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

PAP

LDAP

CHAP

Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authorization

Authentication

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Organizational

Physical

Administrative

Owner

Technical

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Transport

Session

Data Link

Network

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Datalink

Transport

Network

Application

Presentation

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat

incorrect

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

A

C

D

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Transport

Network

Session

Physical

Score 1 of 1

Question:

A LAN is

Response:

a Local Area Network

a Local Authentication Node

a Linear Applebaum Network diagram

a Local Account Name

a Least Access Notification

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Diffe-Hillman's Axiom

Rijndael's Challenge

Moore's Law

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Role-based access control

Access List Control

Mandatory access control

Manager set control

Discretionary access control

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

CER or Type III error

FRR or Type I error

FAR or Type II error

FRA or Type IV error

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Data Integrity

Confidentialty

Availability

Accessibility

Authentication

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Session

Network

Presentation

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Organizational

Administrative

Physical