Overall Questions (15 random)

You got 7 of 19 possible points.
Your score was: 37 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Risk

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Vulnerability

incorrect
Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Session

Data Link

Physical

Transport

Network

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Transport

Physical

Network

Session

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Transport

Presentation

Application

Datalink

Score 0 of 1

Question:

What OSI Layer includes data compression?

Response:

Transport

Application

Datalink

Network

Presentation

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

SMDS

ATM

Frame Relay

MPLS

SONET

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

role-based access control

mandatory access control

Discretionary access control

Clark-Wilson

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Physical

Administrative

Organizational

Technical

Owner

Score 0 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

bus

ring

mesh

star

2 layer star

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Voice

Retinal imagery

Ear shape/pattern

Score 0 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Presentation

Network

Datalink

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electro-mechanical

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Both technical and administrative controls

Physical controls

Administrative controls

Technical controls