Overall Questions (15 random)

You got 9 of 19 possible points.
Your score was: 47 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which classification of fuel type is gasoline given?

Response:

B

C

D

A

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Owner set access control

Need-to-Know control

Access List Control

Mandatory access control

Score 0 of 1
(skipped)

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Fuel/Oxygen

Fire/Fuel/Oxygen

Heat/Combustion/Oxygen

Fire/Combustion/Oxygen

Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRA or Type IV error

FRR or Type I error

FAR or Type II error

CER or Type III error

Score 1 of 1

Question:

Which classification of fuel type is a computer given?

Response:

A

B

D

C

Score 1 of 1

Question:

What OSI Layer includes data compression?

Response:

Application

Network

Datalink

Presentation

Transport

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Physical controls

Administrative controls

Technical controls

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Presentation

Session

Datalink

Network

Score 0 of 1
(skipped)

Question:

Which access control includes intrusion detection?

Response:

Techincal

Administrative

Technical

Physical

Organizational

Owner

Score 1 of 1

Question:

Which classification of fuel type is paper given?

Response:

A

C

B

D

Score 0 of 1
(skipped)

Question:

Match the following examples to their definitions

Response:

MatchUser answerFeedback

Unpatched servers

incorrect

A virus that relies on unpatched code or OS levels

incorrect

The likelihood a threat will be realized, the frequency of natural disasters

incorrect

$1M dollars per day downtime

incorrect

A proxy server

incorrect
Score 0 of 1

Question:

Which of the following is NOT a RAW authentication protocol?

Response:

PAP

EAP

CHAP

LDAP

Score 1 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Corrective

Deterrent

Recovery

Detective

Preventative

Score 0 of 1
(skipped)

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

incorrect

Firewalls, IDS, encryption

incorrect

Lighting, Fencing, guard patrols

incorrect
Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Mechanical

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Electro-mechanical

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect