Overall Questions (15 random)

You got 10 of 19 possible points.
Your score was: 53 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

A LAN is

Response:

a Least Access Notification

a Local Authentication Node

a Local Account Name

a Local Area Network

a Linear Applebaum Network diagram

Score 0 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

MPLS

Frame Relay

ATM

SONET

SMDS

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Wide Area Network

one of the Wilson-Adder Need types

a Wide Array Node

a Working Authentication Name

Score 1 of 1

Question:

Encryption, access control mechanisms, access control lists and remote access authentication protocols are all examples of

Response:

Administrative Controls

Technical controls

Physical Controls

Both Technical and Administrative

Score 1 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Risk

correct

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

star

2 layer star

mesh

bus

ring

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

Water

CO2

ESD Blanket

Soda Acid

Score 0 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FAR or Type II error

CER or Type III error

FRA or Type IV error

FRR or Type I error

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electronic

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 0 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

SMDS

Frame Relay

ATM

MPLS

SONET

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

D

A

C

B

Score 0 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Compensating

incorrect

Correcting violations and incidents

Recovery

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Accountability

Authorization

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Datalink

Network

Presentation

Session