Overall Questions (15 random)

You got 7 of 19 possible points.
Your score was: 37 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

Frame Relay

SONET

ATM

MPLS

Score 0 of 1

Question:

Which of the following is NOT an example of biometric identification?

Response:

Voice

Retinal imagery

Hand shape/pattern

Ear shape/pattern

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Exposure

incorrect

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Threat

correct

The probability of a threat being realized

Vulnerability

incorrect

Presence of a vulnerability which exposes the organization

Risk

incorrect
Score 1 of 1

Question:

Account administration, policies and standards, asset classification and reviews of audit trails are all examples of

Response:

Technical controls

Both technical and administrative controls

Physical controls

Administrative controls

Score 1 of 1

Question:

Work factor is defined as:

Response:

the amount of effort/time required by an algorithm to fully encrypt or decrypt a message

the amount of effort/time required to maintain an established security plan once it has been implemented

the amount of effort/time required by an administrator to establish a reasonable system security plan

the amount of effort/time required by an attacker to overcome a protective measure

Score 0 of 1

Question:

Which access control includes job rotation?

Response:

Technical

Organizational

Physical

Administrative

Score 1 of 1

Question:

Which of the following is primarily focused on identifying alternate solutions to achieve a task?

Response:

Compensating

Corrective

Preventative

Recovery

Detective

Score 0 of 1

Question:

Clark-Wilson focuses primarily on:

Response:

Address Integrity

Accessibility

Availability

Authentication

Confidentialty

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Application

Transport

Network

Datalink

Presentation

Score 0 of 1

Question:

Which access control includes training?

Response:

Organizational

Technical

Physical

Administrative

Score 1 of 1

Question:

Which access control includes audit trails?

Response:

Administrative

Owner

Organizational

Physical

Technical

Score 1 of 5

Question:

Match the following cryptology tools and technologies

Response:

MatchUser answerFeedback

One-time pads

Manual

Still in use in some instances. Recall, one-time pads are the most secure approach

correct

Enigma machine

Electro-mechanical

Electrical lights, mechanical crank/spinwheel

correct

AES, RSA Algorithms

Mechanical

I know, you wanted to think "digital" but technically, electronic works as well

incorrect

Cipherdisks

Electronic

Think ceasar's spin wheel here

incorrect

Single photon emissions

Quantum cryptography

used to provide secure key negotiation. After the test, go google "einstein spooky action" to see what will keep future CISSP's from sleeping at night

correct
Score 1 of 1

Question:

Which access control includes motion detectors?

Response:

Physical

Administrative

Technical

Authentication

Organizational

Score 0 of 1

Question:

Which of the following is NOT an example of SSO?

Response:

KErberos

KryptoKnight

LDAP

SESAME

Score 1 of 1

Question:

Which of the following are the three components of the fire triangle?

Response:

Heat/Combustion/Oxygen

Heat/Fuel/Oxygen

Fire/Combustion/Oxygen

Fire/Fuel/Oxygen