Overall Questions (15 random)

You got 15 of 19 possible points.
Your score was: 79 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Recovery

incorrect

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Physical controls

Technical controls

Administrative controls

Both Technical and Administrative controls

Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Administrative

Authentication

Organizational

Technical

Score 1 of 1

Question:

How many levels are there in the latest (June 2013) OSI model?

Response:

8

10

5

6

7

Score 0 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Recovery

Preventative

Compensating

Detective

Score 0 of 1

Question:

Owner-set permissions are an example of:

Response:

Discretionary access control

role-based access control

mandatory access control

Clark-Wilson

Score 1 of 1

Question:

Which access control includes locked doors?

Response:

Technical

Organizational

Physical

Administrative

Owner

Score 1 of 1

Question:

Which access control protects the entire system?

Response:

Firewalls/IPS

Data Access Controls

Access Control Lists

Operating System Controls/Policies

System Access Controls

Score 4 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Electronic

I know, you wanted to think "digital" but technically, electronic works as well

correct

Cipherdisks

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

John's computer access changed with his reassignment to a new department. This is an example of:

Response:

Access List Control

Need-to-Know control

Owner set access control

Role-based access control

Mandatory access control

Score 1 of 1

Question:

Which access control includes cameras?

Response:

Visual

Organizational

Physical

Technical

Administrative

Score 1 of 1

Question:

Which of the following is immediately above the Transport Layer in the OSI model:

Response:

Network

Datalink

Presentation

Session

Score 1 of 1

Question:

Which classification of fuel type is grease given?

Response:

A

C

D

B

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required by an attacker to overcome a protective measure

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Hand shape/pattern

Ear shape/pattern

Retinal imagery

Voice