Overall Questions (15 random)

You got 11 of 19 possible points.
Your score was: 58 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

LophtCrack

John the Ripper

MAC the Knife

brute force/dictionary attack

Packet sniffing

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Both Technical and Administrative controls

Administrative controls

Technical controls

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

MPLS

SMDS

SONET

Frame Relay

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Technical controls

Administrative Controls

Physical Controls

Both Technical and Administrative

Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Preventative

Detective

Corrective

Compensating

Recovery

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Network

Application

Data Link

Session

Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Presentation

Network

Transport

Data Link

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

MPLS

SONET

Frame Relay

SMDS

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Manual

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Technical

Administrative

Organizational

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Transport

Datalink

Session

Presentation

Network

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen