Overall Questions (15 random)

You got 7 of 19 possible points.
Your score was: 37 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

TACACS

OpenVPN

KERBEROS

SESAME

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authorization

Authentication

Score 1 of 1

Question:

What is the ideal humidity level for a data center?

Response:

20-40%

30-50%

40-60%

60-80%

Score 0 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Exposure

incorrect

$1M dollars per day downtime

Risk

incorrect

A proxy server

Countermeasure

correct
Score 0 of 1
(skipped)

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

incorrect

Intended to avoid an incident from happening

incorrect

Fixes component or systems after an incident has occurred

incorrect

Intended to bring the environment back to production levels

incorrect

Identify an incidents activities

incorrect

Alternate measures of control

incorrect
Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which access control includes training?

Response:

Technical

Organizational

Physical

Administrative

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Rijndael's Challenge

Diffe-Hillman's Axiom

Moore's Law

Score 0 of 1
(skipped)

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

incorrect

Correcting violations and incidents

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

incorrect

Providing alternate ways of accomplishing a task

incorrect

Restoring systems and information

incorrect
Score 0 of 1

Question:

Which access control includes asset classification?

Response:

Physical

Technical

Administrative

Organizational

Owner

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Ear shape/pattern

Hand shape/pattern

Retinal imagery

Voice

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

LophtCrack

MAC the Knife

John the Ripper

brute force/dictionary attack

Packet sniffing

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

Frame Relay

SMDS

SONET

ATM

MPLS