Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Session

Presentation

Network

Datalink

Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Technical controls

Physical controls

Administrative controls

Both Technical and Administrative controls

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Technical

Organizational

Physical

Score 0 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Physical controls

Administrative controls

Both technical and administrative controls

Technical controls

Score 0 of 1

Question:

Determining whether a subject can log into a system is an example of

Response:

Authentication

Authorization

Accountability

Score 1 of 1

Question:

Which OSI layer includes the LLC and MAC sub-layers?

Response:

Network

Transport

Physical

Session

Data Link

Score 1 of 1

Question:

Which access control requires sensitivity labels on all subjects and objects?

Response:

Discretionary access control

Manager set control

Role-based access control

Access List Control

Mandatory access control

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

LDAP

KryptoKnight

SESAME

KErberos

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

ATM

MPLS

SONET

SMDS

Frame Relay

Score 1 of 1

Question:

Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?

Response:

SONET

MPLS

ATM

Frame Relay

SMDS

Score 1 of 1

Question:

Match the following terms to definitions

Response:

MatchUser answerFeedback

Training, configuration management of documentation, risk management

Administrative controls

correct

Firewalls, IDS, encryption

Technical controls

correct

Lighting, Fencing, guard patrols

Physical Controls

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Role-based access control

Access List Control

Need-to-Know control

Owner set access control

Mandatory access control

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

6

8

5

10

7

Score 1 of 1

Question:

Which of the following is immediately above the Data Link Layer in the OSI model:

Response:

Session

Datalink

Transport

Network

Presentation

Score 1 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Diffe-Hillman's Axiom

Rijndael's Challenge

Kerckhoff's Principle

Feedback:

Auguste Kerckhoff, trying to get the French to clean up their military cryptography back in 1883... seriously kickin' it old school.

Moore's Law