Overall Questions (15 random)

You got 9 of 15 possible points.
Your score was: 60 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 1

Question:

Match the following terms and definitions

Response:

MatchUser answerFeedback

Intended to discourage a potential attacker

Deterrent

correct

Intended to avoid an incident from happening

Preventive

correct

Fixes component or systems after an incident has occurred

Corrective

correct

Intended to bring the environment back to production levels

Recovery

correct

Identify an incidents activities

Detective

correct

Alternate measures of control

Compensating

correct
Score 1 of 1

Question:

Motion detectors, video cameras, fences, locked doors, guards and dogs are all examples of

Response:

Both Technical and Administrative controls

Technical controls

Administrative controls

Physical controls

Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Administrative

Organizational

Physical

Technical

Score 1 of 1

Question:

Which of the following have the best CER?

Response:

Badge Scanning

Hand scanning

Iris Scanning

Finger scanning

Score 1 of 1

Question:

Match the following control types to their purposes

Response:

MatchUser answerFeedback

Reducing Risk

Preventative

correct

Correcting violations and incidents

Recovery

Corrective controls also help improve existing preventative and detective controls

incorrect

Discouraging violations

Deterrent

correct

Providing alternate ways of accomplishing a task

Compensating

correct

Restoring systems and information

Recovery

correct
Score 1 of 1

Question:

Which of the following is primarily focused on restoring systems and information?

Response:

Corrective

Recovery

Preventative

Detective

Compensating

Score 1 of 1

Question:

A WAN is

Response:

one of the Wilson-Adder Need types

a Wide Array Node

a Wide Area Network

the Westinghouse Address Naming convention

a Working Authentication Name

Score 0 of 1

Question:

Which of the following is the highest in the OSI model:

Response:

Physical

Network

Data Link

Presentation

Transport

Score 0 of 1

Question:

What OSI Layer includes data encryption?

Response:

Network

Application

Transport

Datalink

Presentation

Score 0 of 1

Question:

"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as

Response:

Rijndael's Challenge

Kerckhoff's Principle

Moore's Law

Diffe-Hillman's Axiom

Score 0 of 1

Question:

Which of the following packet switched networks is best suited to support fully meshed VPNs?

Response:

SMDS

SONET

MPLS

ATM

Frame Relay

Score 1 of 1

Question:

Biometric authentication is most often hampered by:

Response:

Rings/Weight change

Initial Registration

User acceptance

Cost to implement

Score 0 of 1

Question:

More key terms from Chapter 2

Response:

MatchUser answerFeedback

Weakness or lack of a countermeasure

Vulnerability

correct

Entity that can exploit a vulnerability

Threat agent

correct

The danger of having a vulnerability exploited

Risk

incorrect

The probability of a threat being realized

Threat

incorrect

Presence of a vulnerability which exposes the organization

Exposure

correct
Score 1 of 1

Question:

Which access control includes job rotation?

Response:

Physical

Organizational

Administrative

Technical

Score 0 of 1

Question:

Which of the following would be the least useful in attempting to crack a password?

Response:

Packet sniffing

John the Ripper

MAC the Knife

brute force/dictionary attack

LophtCrack