Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Threat

incorrect
Score 1 of 1

Question:

Match the following key terms

Response:

MatchUser answerFeedback

Availability

Reliable and timely access to data and resources

correct

Confidentiality

Necessary level of secrecy, unauthorized disclosure is prevented

correct

Shoulder surfing

Unauthorized viewing of information (screen peeking)

correct

Social Engineering

Tricking someone into giving sensitive information (to gain unauthorized access)

correct
Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Datalink

Transport

Presentation

Network

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Datalink

Transport

Application

Presentation

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

Frame Relay

ATM

MPLS

SONET

SMDS

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Mandatory access control

Access List Control

Manager set control

Role-based access control

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Data Link

Network

Transport

Session

Application

Score 0 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Data Link

Transport

Session

Network

Physical

Score 0 of 1

Question:

In MAC the access policy is set by:

Response:

the GPO

the role

the system

the owner

network ACL

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Administrative

Organizational

Technical

Visual

Physical

Score 1 of 1

Question:

A LAN is

Response:

a Local Authentication Node

a Local Account Name

a Linear Applebaum Network diagram

a Local Area Network

a Least Access Notification

Score 1 of 1

Question:

Which classification of fuel type are electrical fires given?

Response:

C

B

A

D

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

LophtCrack

MAC the Knife

brute force/dictionary attack

John the Ripper

Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

LDAP

EAP

CHAP

PAP

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Presentation

Network

Session

Datalink