Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Session

Data Link

Network

Physical

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

User acceptance

Initial Registration

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the role

the system

network ACL

the GPO

the owner

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Deterrent

Detective

Preventative

Recovery

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Hand shape/pattern

Ear shape/pattern

Retinal imagery

Score 0 of 1

Question:

What is the ideal humidity level for a data center?

Response:

20-40%

40-60%

60-80%

30-50%

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Organizational

Technical

Physical

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

CHAP

LDAP

EAP

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Corrective

Compensating

Detective

Preventative

Recovery

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

ATM

SONET

Frame Relay

SMDS

MPLS

Score 0 of 1

Question:

Which access control includes intrusion detection?

Response:

Organizational

Technical

Administrative

Techincal

Owner

Physical

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Organizational

Technical

Authentication

Administrative

Physical

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electro-mechanical

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct