Overall Questions (15 random)

You got 12 of 19 possible points.
Your score was: 63 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Which of the following is not a typical layer 1 topology?

Response:

2 layer star

ring

mesh

bus

star

Score 0 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Electro-mechanical

Still in use in some instances. Recall, one-time pads are the most secure approach

incorrect

Enigma machine

Manual

Electrical lights, mechanical crank/spinwheel

incorrect

AES, RSA Algorithms

Quantum cryptography

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Mechanical

Think ceasar's spin wheel here

correct

Single photon emissions

Electronic

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

incorrect
Score 1 of 1

Question:

Which of the following is the lowest in the OSI model:

Response:

Network

Transport

Application

Data Link

Session

Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Owner set access control

Need-to-Know control

Access List Control

Mandatory access control

Score 1 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

LophtCrack

MAC the Knife

Packet sniffing

brute force/dictionary attack

John the Ripper

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Organizational

Administrative

Physical

Technical

Score 1 of 1

Question:

Owner-set permissions are an example of:

Response:

Clark-Wilson

role-based access control

mandatory access control

Discretionary access control

Score 1 of 1

Question:

Which access control includes training?

Response:

Organizational

Physical

Administrative

Technical

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Cost to implement

Rings/Weight change

Initial Registration

User acceptance

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Moore's Law

Rijndael's Challenge

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Score 1 of 1

Question:

Which of the following packet switched networks uses HDLC?

Response:

Frame Relay

ATM

SONET

MPLS

SMDS

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

Falsely rejecting an authorized user is:

Response:

FRA or Type IV error

FRR or Type I error

FAR or Type II error

CER or Type III error

Score 0 of 1

Question:

Which of the following is primarily focused on reducing risk?

Response:

Recovery

Detective

Corrective

Deterrent

Preventative

Score 0 of 1

Question:

Which access control includes audit trails?

Response:

Administrative

Owner

Physical

Organizational

Technical