Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which access control includes training?

Response:

Technical

Administrative

Organizational

Physical

Score 0 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Physical

Network

Data Link

Session

Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Administrative

Organizational

Owner

Physical

Technical

Score 1 of 1

Question:

A WAN is

Response:

one of the Wilson-Adder Need types

a Wide Array Node

a Wide Area Network

a Working Authentication Name

the Westinghouse Address Naming convention

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Presentation

Network

Datalink

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Organizational

Physical

Administrative

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Data Access Controls

Access Control Lists

Firewalls/IPS

System Access Controls

Operating System Controls/Policies

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

ATM

SONET

SMDS

Frame Relay

MPLS

Score 0 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Preventative

Recovery

Corrective

Detective

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Corrective

Detective

Recovery

Deterrent

Score 0 of 1

Question:

Which access control includes motion detectors?

Response:

Technical

Physical

Administrative

Authentication

Organizational

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Owner set access control

Role-based access control

Access List Control

Need-to-Know control

Score 0 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Access List Control

Mandatory access control

Manager set control

Role-based access control

Discretionary access control