Overall Questions (15 random)

You got 10 of 15 possible points.
Your score was: 67 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Accountability

Authentication

Authorization

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Exposure

incorrect

Presence of a vulnerability which exposes the organization

Risk

incorrect
Score 0 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Need-to-Know control

Owner set access control

Access List Control

Role-based access control

Mandatory access control

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

C

A

D

B

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Technical

Administrative

Owner

Physical

Organizational

Score 1 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Retinal imagery

Ear shape/pattern

Hand shape/pattern

Voice

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

MAC the Knife

LophtCrack

John the Ripper

brute force/dictionary attack

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Physical

Data Link

Network

Transport

Session

Score 1 of 1

Question:

A WAN is

Response:

the Westinghouse Address Naming convention

a Working Authentication Name

a Wide Array Node

a Wide Area Network

one of the Wilson-Adder Need types

Score 0 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

role-based access control

mandatory access control

Discretionary access control

Score 0 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Fuel/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Physical

Data Link

Network

Transport

Session

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Administrative

Organizational

Physical

Technical

Authentication

Score 1 of 1

Question:

Which access control includes training?

Response:

Administrative

Technical

Physical

Organizational