Overall Questions (15 random)

You got 11 of 19 possible points.
Your score was: 58 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following extinguishing methods is best for a computer or electrical fire?

Response:

ESD Blanket

Water

CO2

Soda Acid

Score 0 of 1

Question:

Which access control protects the entire system?

Response:

System Access Controls

Data Access Controls

Operating System Controls/Policies

Access Control Lists

Firewalls/IPS

Score 1 of 1

Question:

In MAC the access policy is set by:

Response:

the role

network ACL

the owner

the GPO

the system

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Physical

Organizational

Administrative

Score 1 of 1

Question:

Which of the following is a remote authentication system?

Response:

OpenVPN

SESAME

KERBEROS

TACACS

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Transport

Session

Data Link

Physical

Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Transport

Network

Session

Application

Data Link

Score 0 of 1

Question:

What is the ideal humidity level for a data center?

Response:

60-80%

30-50%

20-40%

40-60%

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Mechanical

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Manual

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which access control includes training?

Response:

Physical

Technical

Organizational

Administrative

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Administrative

Technical

Organizational

Owner

Physical

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Datalink

Session

Presentation

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Availability

Address Integrity

Accessibility

Authentication

Confidentialty