Overall Questions (15 random)

You got 8 of 19 possible points.
Your score was: 42 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Bell-La Padula focuses primarily on:

Response:

Confidentialty

Availability

Authentication

Accessibility

Data Integrity

Score 0 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Owner set access control

Need-to-Know control

Role-based access control

Access List Control

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

EAP

CHAP

PAP

LDAP

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Data Link

Session

Network

Transport

Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Compensating

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Detective

incorrect

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Transport

Data Link

Presentation

Network

Score 0 of 1

Question:

Which access control includes cameras?

Response:

Physical

Organizational

Visual

Administrative

Technical

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

10

7

5

8

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Organizational

Technical

Administrative

Physical

Owner

Score 0 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

Clark-Wilson

Discretionary access control

mandatory access control

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

bus

2 layer star

ring

star

mesh

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

Score 1 of 1

Question:

A WAN is

Response:

a Working Authentication Name

the Westinghouse Address Naming convention

a Wide Array Node

a Wide Area Network

one of the Wilson-Adder Need types