Overall Questions (15 random)

You got 14 of 19 possible points.
Your score was: 74 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

Vulnerability

correct

A virus that relies on unpatched code or OS levels

Threat

correct

The likelihood a threat will be realized, the frequency of natural disasters

Risk

correct

$1M dollars per day downtime

Exposure

correct

A proxy server

Countermeasure

correct
Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Detective

Corrective controls also help improve existing preventative and detective controls

correct

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

ATM

MPLS

Frame Relay

SMDS

SONET

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an administrator to establish a reasonable system security plan

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Preventative

Detective

Recovery

Deterrent

Corrective

Score 5 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 0 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Mandatory access control

Owner set access control

Role-based access control

Need-to-Know control

Access List Control

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Rijndael's Challenge

Kerckhoff's Principle

Moore's Law

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

network ACL

the system

the owner

the role

the GPO

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

Initial Registration

Cost to implement

User acceptance

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SONET

ATM

MPLS

SMDS

Frame Relay

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

D

C

B

A

Score 1 of 1

Question:

Which classification of fuel type is wood given?

Response:

B

A

C

D

Score 0 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Datalink

Presentation

Network

Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct